org.apache.rocketmq:rocketmq-broker@5.0.0-PREVIEW vulnerabilities

  • latest version

    5.3.1

  • latest non vulnerable version

  • first published

    7 years ago

  • latest version published

    4 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.rocketmq:rocketmq-broker package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Credential Exposure

    org.apache.rocketmq:rocketmq-broker is a distributed messaging and streaming platform.

    Affected versions of this package are vulnerable to Credential Exposure. A low-privileged user or one with a whitelisted IP address, who has access to the broker IP address list, can gain access to the credentials for an administrator account even if authentication and authorization are in use.

    How to fix Credential Exposure?

    Upgrade org.apache.rocketmq:rocketmq-broker to version 5.3.0 or higher.

    [4.5.2,5.3.0)
    • H
    Arbitrary Code Injection

    org.apache.rocketmq:rocketmq-broker is a distributed messaging and streaming platform.

    Affected versions of this package are vulnerable to Arbitrary Code Injection. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.

    How to fix Arbitrary Code Injection?

    Upgrade org.apache.rocketmq:rocketmq-broker to version 4.9.6, 5.1.1 or higher.

    [,4.9.6)[5.0.0,5.1.1)