This is an automated email from the ASF dual-hosted git repository.

jbertram pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/main by this push:
     new eea6ae873 Updating description of CVE-2023-46604
eea6ae873 is described below

commit eea6ae8730b6527feb2c818a0d343c63551e749b
Author: Justin Bertram <[email protected]>
AuthorDate: Fri Nov 10 23:42:55 2023 -0600

    Updating description of CVE-2023-46604
---
 src/_news/CVE-2023-46604.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/src/_news/CVE-2023-46604.md b/src/_news/CVE-2023-46604.md
index 3a8a40545..2afeadf84 100644
--- a/src/_news/CVE-2023-46604.md
+++ b/src/_news/CVE-2023-46604.md
@@ -27,9 +27,9 @@ Artemis:
 
 #### CVE Overview
 
-As stated in the [official CVE 
description](https://nvd.nist.gov/vuln/detail/CVE-2023-46604):
+As stated in the official CVE description:
 
-> Apache ActiveMQ is vulnerable to Remote Code Execution. The vulnerability 
may allow a remote attacker with network access to a broker to run arbitrary 
shell commands by manipulating serialized class types in the OpenWire protocol 
to cause the broker to instantiate any class on the classpath.
+> The Java OpenWire protocol marshaller is vulnerable to Remote Code 
Execution. This vulnerability may allow a remote attacker with network access 
to either a Java-based OpenWire broker or client to run arbitrary shell 
commands by manipulating serialized class types in the OpenWire protocol to 
cause either the client or the broker (respectively) to instantiate any class 
on the classpath.
 
 Three things are required to exploit this vulnerability:
 

Reply via email to