org.apache.activemq:artemis-core-client@2.7.0 vulnerabilities

  • latest version

    2.40.0

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.activemq:artemis-core-client package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Insertion of Sensitive Information into Log File

    org.apache.activemq:artemis-core-client is a High-performance, non-blocking architecture for the next generation of event-driven messaging applications.

    Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File when the ConfigurationImpl logger is being set to debug level. An attacker can access sensitive broker properties by exploiting the verbose logging configuration.

    How to fix Insertion of Sensitive Information into Log File?

    Upgrade org.apache.activemq:artemis-core-client to version 2.40.0 or higher.

    [1.5.1,2.40.0)
    • M
    Denial of Service (DoS)

    org.apache.activemq:artemis-core-client is a High-performance, non-blocking architecture for the next generation of event-driven messaging applications.

    Affected versions of this package are vulnerable to Denial of Service (DoS) via a crafted message sent to a Java process running an Artemis Broker. This can result in an Out-Of-Memory crash.

    ###PoC

    cat /path/to/dospayload.binary > /dev/tcp/<broker_address>/<broker_port>

    NOTE: This vulnerability has also been identified as: CVE-2021-4040

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.activemq:artemis-core-client to version 2.19.1 or higher.

    [,2.19.1)
    • M
    Denial of Service (DoS)

    org.apache.activemq:artemis-core-client is a High-performance, non-blocking architecture for the next generation of event-driven messaging applications.

    Affected versions of this package are vulnerable to Denial of Service (DoS) via a crafted message sent to a Java process running an Artemis Broker. This can result in an Out-Of-Memory crash.

    ###PoC

    cat /path/to/dospayload.binary > /dev/tcp/<broker_address>/<broker_port>

    NOTE: This vulnerability has also been identified as: CVE-2022-23913

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.activemq:artemis-core-client to version 2.19.1 or higher.

    [,2.19.1)
    • M
    Incorrect Default Permissions

    org.apache.activemq:artemis-core-client is a High-performance, non-blocking architecture for the next generation of event-driven messaging applications.

    Affected versions of this package are vulnerable to Incorrect Default Permissions. A flaw was found in ActiveMQ Artemis management API where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the resetUsers operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.

    How to fix Incorrect Default Permissions?

    Upgrade org.apache.activemq:artemis-core-client to version 2.12.0 or higher.

    [2.7.0,2.12.0)