Name | CVE-2020-13920 |
Description | Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2400-1, DLA-3657-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
activemq (PTS) | jessie, jessie (lts) | 5.6.0+dfsg1-4+deb8u3 | vulnerable |
| stretch (security) | 5.14.3-3+deb9u2 | fixed |
| stretch (lts), stretch | 5.14.3-3+deb9u3 | fixed |
| buster, buster (lts) | 5.15.16-0+deb10u2 | fixed |
| buster (security) | 5.15.16-0+deb10u1 | fixed |
| bullseye | 5.16.1-1 | fixed |
| bullseye (security) | 5.16.1-1+deb11u1 | fixed |
| bookworm (security), bookworm | 5.17.2+dfsg-2+deb12u1 | fixed |
| sid, trixie | 5.17.6+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
http://activemq.apache.org/security-advisories.data/CVE-2020-13920-announcement.txt
When fixing this issue make sure to use a complete fix and not open up
CVE-2020-11998 (a regression introduced in 5.15.12 in the commit preventing
JMX re-bind).
Fixed by: https://github.com/apache/activemq/commit/c29244931d54affaceabb478b3a52d9b74f5d543 (activemq-5.15.12)
Followup needed: https://github.com/apache/activemq/commit/0d6e5f240ef34bae2e4089102047593bef628e6c (activemq-5.15.13)