CVE-2023-50780
Java vulnerability analysis and mitigation

Overview

Apache ActiveMQ Artemis, before version 2.29.0, contained a vulnerability that exposed diagnostic information and controls through MBeans via the authenticated Jolokia endpoint. The vulnerability, identified as CVE-2023-50780, specifically included unauthorized exposure of the Log4J2 MBean, which was not intended for non-administrative users. This security flaw was discovered by Matei "Mal" Badanoiu and has been assigned a CVSS v3.1 base score of 8.8 (HIGH) (NVD, Red Hat).

Technical details

The vulnerability stems from improper authorization (CWE-285) in the MBean exposure mechanism. The authenticated Jolokia endpoint provided access to diagnostic controls including the Log4J2 MBean, which should have been restricted to administrative users only. The vulnerability received a CVSS v3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and high impacts on confidentiality, integrity, and availability (NVD).

Impact

The vulnerability could allow an authenticated attacker to write arbitrary files to the filesystem and potentially achieve Remote Code Execution (RCE). While the vulnerability is rated as Important rather than Critical, it poses significant risks as successful exploitation could lead to system compromise. However, the attack requires valid credentials to access the Jolokia endpoint, which limits the scope to scenarios involving already-compromised accounts or insider threats (Red Hat).

Mitigation and workarounds

Users are strongly recommended to upgrade to Apache ActiveMQ Artemis version 2.29.0 or later, which contains the fix for this vulnerability. No alternative mitigations are currently available that meet Red Hat Product Security criteria for ease of use, deployment, and stability (Red Hat).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management