#VU50072 Improper Authentication in ActiveMQ and ActiveMQ Artemis - CVE-2021-26117


| Updated: 2021-01-28

Vulnerability identifier: #VU50072

Vulnerability risk: High

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2021-26117

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
ActiveMQ
Server applications / Mail servers
ActiveMQ Artemis
Server applications / Other server solutions

Vendor: Apache Foundation

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to a logic error in ActiveMQ LDAP login module when configured to to use anonymous access to the LDAP server. A remote attacker can provide a valid username and no password and gain unauthorized access to the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

ActiveMQ: 5.15.0 - 5.16.0

ActiveMQ Artemis: 1.0.0 - 2.15.0


External links
https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e
https://issues.apache.org/jira/browse/AMQ-8035
https://issues.apache.org/jira/browse/ARTEMIS-2895


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability