The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability may allow a remote attacker with network
access to either a Java-based OpenWire broker or client to run arbitrary
shell commands by manipulating serialized class types in the OpenWire
protocol to cause either the client or the broker (respectively) to
instantiate any class on the classpath.
Users are recommended to upgrade
both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3
which fixes this issue.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
13 Feb 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue. |
23 Jan 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| References | () https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt - Vendor Advisory |
27 Jun 2024, 18:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Debian
Netapp e-series Santricity Unified Manager Debian debian Linux Netapp e-series Santricity Web Services Proxy Netapp santricity Storage Plugin Netapp |
|
| References | () http://seclists.org/fulldisclosure/2024/Apr/18 - Mailing List, Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20231110-0010/ - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html - Mailing List, Third Party Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2023/10/27/5 - Mailing List | |
| References | () https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:* |
11 Apr 2024, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Nov 2023, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
20 Nov 2023, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 Nov 2023, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
11 Nov 2023, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue. |
10 Nov 2023, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
08 Nov 2023, 14:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | (MISC) https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt - Vendor Advisory | |
| References | (MISC) http://www.openwall.com/lists/oss-security/2023/10/27/5 - Mailing List, Third Party Advisory | |
| First Time |
Apache
Apache activemq Apache activemq Legacy Openwire Module |
|
| CPE | cpe:2.3:a:apache:activemq_legacy_openwire_module:*:*:*:*:*:*:*:* cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* |
27 Oct 2023, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Oct 2023, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-10-27 15:15
Updated : 2025-03-06 19:48
NVD link : CVE-2023-46604
Mitre link : CVE-2023-46604
JSON object : View
Products Affected
debian
- debian_linux
apache
- activemq
- activemq_legacy_openwire_module
netapp
- santricity_storage_plugin
- e-series_santricity_unified_manager
- e-series_santricity_web_services_proxy
CWE
No CWE.
