CVE-2023-46604

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:apache:activemq_legacy_openwire_module:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_legacy_openwire_module:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_legacy_openwire_module:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_legacy_openwire_module:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*

History

13 Feb 2025, 18:15

Type Values Removed Values Added
Summary The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue. The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

23 Jan 2025, 16:16

Type Values Removed Values Added
References (MISC) https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt - Vendor Advisory () https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt - Vendor Advisory
CWE CWE-502

27 Jun 2024, 18:30

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Apr/18 - () http://seclists.org/fulldisclosure/2024/Apr/18 - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20231110-0010/ - () https://security.netapp.com/advisory/ntap-20231110-0010/ - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html - () https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html - Mailing List, Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2023/10/27/5 - () https://www.openwall.com/lists/oss-security/2023/10/27/5 - Mailing List
References () https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html - () https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
First Time Debian
Netapp e-series Santricity Unified Manager
Debian debian Linux
Netapp e-series Santricity Web Services Proxy
Netapp santricity Storage Plugin
Netapp
CPE cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*

11 Apr 2024, 08:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Apr/18 -

28 Nov 2023, 15:15

Type Values Removed Values Added
References
  • {'url': 'http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html', 'name': 'http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html', 'tags': [], 'refsource': ''}
  • () https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html -

20 Nov 2023, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html -

14 Nov 2023, 03:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html -

11 Nov 2023, 09:15

Type Values Removed Values Added
Summary Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.  Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue. The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2023/10/27/5', 'name': 'http://www.openwall.com/lists/oss-security/2023/10/27/5', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://www.openwall.com/lists/oss-security/2023/10/27/5 -

10 Nov 2023, 18:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20231110-0010/ -

08 Nov 2023, 14:28

Type Values Removed Values Added
First Time Apache
Apache activemq
Apache activemq Legacy Openwire Module
CPE cpe:2.3:a:apache:activemq_legacy_openwire_module:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
References (MISC) https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt - (MISC) https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt - Vendor Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2023/10/27/5 - (MISC) http://www.openwall.com/lists/oss-security/2023/10/27/5 - Mailing List, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

27 Oct 2023, 18:15

Type Values Removed Values Added
References
  • (MISC) http://www.openwall.com/lists/oss-security/2023/10/27/5 -

27 Oct 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-27 15:15

Updated : 2025-03-06 19:48


NVD link : CVE-2023-46604

Mitre link : CVE-2023-46604


JSON object : View

Products Affected

debian

  • debian_linux

apache

  • activemq
  • activemq_legacy_openwire_module

netapp

  • santricity_storage_plugin
  • e-series_santricity_unified_manager
  • e-series_santricity_web_services_proxy
CWE

No CWE.