Vulnerability identifier: #VU50072
Vulnerability risk: High
CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-26117
CWE-ID:
CWE-287
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
ActiveMQ
Server applications /
Mail servers
ActiveMQ Artemis
Server applications /
Other server solutions
Vendor: Apache Foundation
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to a logic error in ActiveMQ LDAP login module when configured to to use anonymous access to the LDAP server. A remote attacker can provide a valid username and no password and gain unauthorized access to the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
ActiveMQ: 5.15.0 - 5.16.0
ActiveMQ Artemis: 1.0.0 - 2.15.0
External links
https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e
https://issues.apache.org/jira/browse/AMQ-8035
https://issues.apache.org/jira/browse/ARTEMIS-2895
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.