This is an automated email from the ASF dual-hosted git repository.

jbertram pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/main by this push:
     new ea0fc42d6 Clarify CVE-2023-46604
ea0fc42d6 is described below

commit ea0fc42d63597466e2df1854e0fbae73a3fec21d
Author: Justin Bertram <[email protected]>
AuthorDate: Fri Nov 10 23:12:58 2023 -0600

    Clarify CVE-2023-46604
---
 src/security-advisories.data/CVE-2023-46604-announcement.txt | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/src/security-advisories.data/CVE-2023-46604-announcement.txt 
b/src/security-advisories.data/CVE-2023-46604-announcement.txt
index 97f4b80aa..b5157f8bc 100644
--- a/src/security-advisories.data/CVE-2023-46604-announcement.txt
+++ b/src/security-advisories.data/CVE-2023-46604-announcement.txt
@@ -11,9 +11,9 @@ Affected versions:
 
 Description:
 
-Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may 
allow a remote attacker with network access to a broker to run arbitrary shell 
commands by manipulating serialized class types in the OpenWire protocol to 
cause the broker to instantiate any class on the classpath. 
+The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. 
This vulnerability may allow a remote attacker with network access to either a 
Java-based OpenWire broker or client to run arbitrary shell commands by 
manipulating serialized class types in the OpenWire protocol to cause either 
the client or the broker (respectively) to instantiate any class on the 
classpath.
 
-Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 
5.18.3, which fixes this issue.
+Users are recommended to upgrade both brokers and clients to version 5.15.16, 
5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
 
 This issue is being tracked as AMQ-9370
 

Reply via email to