While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.
References
Link | Resource |
---|---|
https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3CCAH%2BvQmMUNnkiXv2-d3ucdErWOsdnLi6CgnK%2BVfixyJvTgTuYig%40mail.gmail.com%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/rafd5d7cf303772a0118865262946586921a65ebd98fc24f56c812574@%3Cannounce.apache.org%3E | Mailing List Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210827-0002/ | Third Party Advisory |
Information
Published : 2021-01-27 11:15
Updated : 2022-08-01 05:37
NVD link : CVE-2021-26118
Mitre link : CVE-2021-26118
JSON object : View
CWE
Products Affected
netapp
- oncommand_workflow_automation
apache
- activemq_artemis