org.apache.activemq:activemq-all@6.2.2

  • latest version

    6.2.3

  • first published

    18 years ago

  • latest version published

    25 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.activemq:activemq-all package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Code Injection

    org.apache.activemq:activemq-all is a package that puts together an ActiveMQ jar bundle.

    Affected versions of this package are vulnerable to Arbitrary Code Injection over the /api/jolokia MBeans interface. A user can execute arbitrary code on the broker's JVM by invoking operations with a malicious discovery URI that feeds into the VM transport's brokerConfig parameter that causes the loading of a remote Spring XML application context using ResourceXmlApplicationContext. This allows for the instantiation of malicious beans through factory methods such as Runtime.exec().

    How to fix Arbitrary Code Injection?

    Upgrade org.apache.activemq:activemq-all to version 5.19.4, 6.2.3 or higher.

    [,5.19.4)[6.0.0,6.2.3)
    • H
    Allocation of Resources Without Limits or Throttling

    org.apache.activemq:activemq-all is a package that puts together an ActiveMQ jar bundle.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in NIO SSL transport processing. An attacker can cause the broker to exhaust all available memory and disrupt service availability by rapidly triggering TLS 1.3 handshake KeyUpdates from a client connection.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.apache.activemq:activemq-all to version 5.19.5, 6.2.4 or higher.

    [,5.19.5)[6.0.0,6.2.4)
    • M
    Integer Overflow or Wraparound

    org.apache.activemq:activemq-all is a package that puts together an ActiveMQ jar bundle.

    Affected versions of this package are vulnerable to Integer Overflow or Wraparound when decoding malformed MQTT packets, due to improper validation of the Remaining Length. An attacker can cause the broker to misinterpret payloads as multiple MQTT control packets by sending malicious packets.

    Note:

    This is only exploitable if the MQTT transport connector is enabled.

    This issue got CVE-2026-40046 assigned specifically to track backports to 6.x.x version line.

    How to fix Integer Overflow or Wraparound?

    Upgrade org.apache.activemq:activemq-all to version 5.19.2, 6.2.4 or higher.

    [,5.19.2)[6.0.0,6.2.4)