org.apache.activemq:artemis-core-client@2.8.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.activemq:artemis-core-client package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

org.apache.activemq:artemis-core-client is a High-performance, non-blocking architecture for the next generation of event-driven messaging applications.

Affected versions of this package are vulnerable to Denial of Service (DoS) via a crafted message sent to a Java process running an Artemis Broker. This can result in an Out-Of-Memory crash.

###PoC

cat /path/to/dospayload.binary > /dev/tcp/<broker_address>/<broker_port>

NOTE: This vulnerability has also been identified as: CVE-2021-4040

How to fix Denial of Service (DoS)?

Upgrade org.apache.activemq:artemis-core-client to version 2.19.1 or higher.

[,2.19.1)
  • M
Denial of Service (DoS)

org.apache.activemq:artemis-core-client is a High-performance, non-blocking architecture for the next generation of event-driven messaging applications.

Affected versions of this package are vulnerable to Denial of Service (DoS) via a crafted message sent to a Java process running an Artemis Broker. This can result in an Out-Of-Memory crash.

###PoC

cat /path/to/dospayload.binary > /dev/tcp/<broker_address>/<broker_port>

NOTE: This vulnerability has also been identified as: CVE-2022-23913

How to fix Denial of Service (DoS)?

Upgrade org.apache.activemq:artemis-core-client to version 2.19.1 or higher.

[,2.19.1)
  • M
Incorrect Default Permissions

org.apache.activemq:artemis-core-client is a High-performance, non-blocking architecture for the next generation of event-driven messaging applications.

Affected versions of this package are vulnerable to Incorrect Default Permissions. A flaw was found in ActiveMQ Artemis management API where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the resetUsers operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.

How to fix Incorrect Default Permissions?

Upgrade org.apache.activemq:artemis-core-client to version 2.12.0 or higher.

[2.7.0,2.12.0)