GHSA-q7fr-vqhq-v5xr

Suggest an improvement
Source
https://github.com/advisories/GHSA-q7fr-vqhq-v5xr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-q7fr-vqhq-v5xr/GHSA-q7fr-vqhq-v5xr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-q7fr-vqhq-v5xr
Aliases
Published
2021-06-16T17:39:05Z
Modified
2024-02-16T08:13:39.562110Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Apache ActiveMQ Artemis vulnerable to Improper Access Control
Details

While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.

Database specific
{
    "nvd_published_at": "2021-01-27T19:15:00Z",
    "cwe_ids": [
        "CWE-284",
        "CWE-287"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-04-05T23:06:41Z"
}
References

Affected packages

Maven / org.apache.activemq:artemis-openwire-protocol

Package

Name
org.apache.activemq:artemis-openwire-protocol
View open source insights on deps.dev
Purl
pkg:maven/org.apache.activemq/artemis-openwire-protocol

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.16.0

Affected versions

1.*

1.0.0
1.1.0
1.2.0
1.3.0
1.4.0
1.5.0
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6

2.*

2.0.0
2.1.0
2.2.0
2.3.0
2.4.0
2.5.0
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.7.0
2.8.0
2.8.1
2.9.0
2.10.0
2.10.1
2.11.0
2.12.0
2.13.0
2.14.0
2.15.0