Apache ActiveMQ Artemis up to 1.3.x Broker/REST GetObject deserialization

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.0 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical has been found in Apache ActiveMQ Artemis up to 1.3.x. This issue affects the function GetObject of the component Broker/REST. Performing a manipulation results in deserialization.
This vulnerability is reported as CVE-2016-4978. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
Details
A vulnerability, which was classified as critical, was found in Apache ActiveMQ Artemis up to 1.3.x (Application Server Software). This affects the function GetObject of the component Broker/REST. The manipulation with an unknown input leads to a deserialization vulnerability. CWE is classifying the issue as CWE-502. The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
The getObject method of the javax.jms.ObjectMessage class in the (1) JMS Core client, (2) Artemis broker, and (3) Artemis REST component in Apache ActiveMQ Artemis before 1.4.0 might allow remote authenticated users with permission to send messages to the Artemis broker to deserialize arbitrary objects and execute arbitrary code by leveraging gadget classes being present on the Artemis classpath.
The weakness was disclosed 09/27/2016 by Matthias Kaiser with Code White (Website). The advisory is shared at mail-archives.apache.org. This vulnerability is uniquely identified as CVE-2016-4978 since 05/24/2016. It is possible to initiate the attack remotely. Required for exploitation is a authentication. Technical details are known, but no exploit is available.
The vulnerability scanner Nessus provides a plugin with the ID 102139 (RHEL 6 : JBoss EAP (RHSA-2017:1834)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Red Hat Local Security Checks and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 236788 (Red Hat Update for JBoss Enterprise Application Platform 6.4.20 (RHSA-2018:1450)).
Upgrading to version 1.4.0 eliminates this vulnerability. A possible mitigation has been published 11 months after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Tenable (102139) and SecurityFocus (BID 93142†). The entries VDB-112884 and VDB-113194 are pretty similar. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.apache.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.2VulDB Meta Temp Score: 7.1
VulDB Base Score: 7.2
VulDB Temp Score: 6.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.2
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: DeserializationCWE: CWE-502 / CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 102139
Nessus Name: RHEL 6 : JBoss EAP (RHSA-2017:1834)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 100463
OpenVAS Name: Apache ActiveMQ Artemis Arbitrary Code Execution Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: ActiveMQ Artemis 1.4.0
Timeline
05/24/2016 🔍09/23/2016 🔍
09/27/2016 🔍
09/27/2016 🔍
09/28/2016 🔍
07/31/2017 🔍
08/03/2017 🔍
09/21/2022 🔍
Sources
Vendor: apache.orgAdvisory: RHSA-2017:1834
Researcher: Matthias Kaiser
Organization: Code White
Status: Not defined
CVE: CVE-2016-4978 (🔍)
GCVE (CVE): GCVE-0-2016-4978
GCVE (VulDB): GCVE-100-92217
SecurityFocus: 93142 - Apache ActiveMQ Artemis CVE-2016-4978 Remote Code Execution Vulnerability
See also: 🔍
Entry
Created: 09/28/2016 09:11Updated: 09/21/2022 14:35
Changes: 09/28/2016 09:11 (68), 04/27/2019 09:14 (14), 09/21/2022 14:35 (3)
Complete: 🔍
Cache ID: 216:0F2:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.