This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new f52efdc15 Automatic Site Publish by Buildbot
f52efdc15 is described below

commit f52efdc157601a4f8281c1798888501f22ce623a
Author: buildbot <[email protected]>
AuthorDate: Wed Nov 22 13:59:16 2023 +0000

    Automatic Site Publish by Buildbot
---
 output/news/cve-2023-46604.html | 25 +++++++++++++------------
 1 file changed, 13 insertions(+), 12 deletions(-)

diff --git a/output/news/cve-2023-46604.html b/output/news/cve-2023-46604.html
index 99b0153ef..efcd9e87d 100644
--- a/output/news/cve-2023-46604.html
+++ b/output/news/cve-2023-46604.html
@@ -96,25 +96,26 @@
 
 <h4 id="summary">Summary</h4>
 
-<p><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-46604";>CVE-2023-46604</a> was 
recently announced and it has caused quite a bit of traffic on the mailing 
lists and in Jira from users curious about its impact on both “Classic” and 
Artemis clients and brokers. In short:</p>
+<p><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-46604";>CVE-2023-46604</a> was 
recently announced and it has caused quite a bit of traffic on the mailing 
lists and in Jira from users curious about its impact on both ActiveMQ Classic 
and ActiveMQ Artemis clients and brokers. In short:</p>
 
 <ul>
-  <li><strong>Users of both “Classic” and Artemis brokers are recommended to 
upgrade.</strong></li>
+  <li><strong>Users of both ActiveMQ Classic and ActiveMQ Artemis brokers are 
recommended to upgrade.</strong></li>
   <li><strong>Users of any Java-based OpenWire client (e.g. Maven dependency 
on <code class="language-plaintext highlighter-rouge">activemq-client</code>) 
are recommended to upgrade (regardless of which broker you’re 
using).</strong></li>
 </ul>
 
 <p>New releases for all current branches were made available on the day the 
CVE was announced:</p>
 
-<p>“Classic”:</p>
+<p>ActiveMQ Classic:</p>
 
 <ul>
-  <li><a 
href="https://activemq.apache.org/activemq-5015016-release";>5.15.16</a> (last 
release from this branch)</li>
-  <li><a 
href="https://activemq.apache.org/activemq-5016007-release";>5.16.7</a> (last 
release from this branch)</li>
-  <li><a 
href="https://activemq.apache.org/activemq-5017006-release";>5.17.6</a></li>
+  <li><a 
href="https://activemq.apache.org/activemq-6000000-release";>6.0.0</a></li>
   <li><a 
href="https://activemq.apache.org/activemq-5018003-release";>5.18.3</a></li>
+  <li><a 
href="https://activemq.apache.org/activemq-5017006-release";>5.17.6</a></li>
+  <li><a 
href="https://activemq.apache.org/activemq-5016007-release";>5.16.7</a> (last 
release from this branch)</li>
+  <li><a 
href="https://activemq.apache.org/activemq-5015016-release";>5.15.16</a> (last 
release from this branch)</li>
 </ul>
 
-<p>Artemis:</p>
+<p>ActiveMQ Artemis:</p>
 
 <ul>
   <li><a 
href="https://activemq.apache.org/components/artemis/download/";>2.31.2</a></li>
@@ -132,21 +133,21 @@
 
 <ol>
   <li>Network access</li>
-  <li>A manipulated OpenWire “command” (used to instantiate an arbitrary class 
on the classpath with a <code class="language-plaintext 
highlighter-rouge">String</code> parameter)</li>
+  <li>A manipulated OpenWire command (used to instantiate an arbitrary class 
on the classpath with a <code class="language-plaintext 
highlighter-rouge">String</code> parameter)</li>
   <li>A class on the classpath which can execute arbitrary code simply by 
instantiating it with a <code class="language-plaintext 
highlighter-rouge">String</code> parameter</li>
 </ol>
 
 <p>The manipulated command (i.e. #2) can be sent by a client to a broker or 
from a broker to a client so <strong>both</strong> are vulnerable.</p>
 
-<h4 id="classic-details">“Classic” Details</h4>
+<h4 id="activemq-classic-details">ActiveMQ Classic Details</h4>
 
-<p>The “Classic” broker ships with a handful of Spring dependencies including 
<a 
href="https://docs.spring.io/spring-framework/docs/current/javadoc-api/org/springframework/context/support/ClassPathXmlApplicationContext.html";><code
 class="language-plaintext 
highlighter-rouge">org.springframework.context.support.ClassPathXmlApplicationContext</code></a>
 which is used to run Spring applications. This class is not only present on 
the broker, but it is an extremely common client-side dependen [...]
+<p>The ActiveMQ Classic broker ships with a handful of Spring dependencies 
including <a 
href="https://docs.spring.io/spring-framework/docs/current/javadoc-api/org/springframework/context/support/ClassPathXmlApplicationContext.html";><code
 class="language-plaintext 
highlighter-rouge">org.springframework.context.support.ClassPathXmlApplicationContext</code></a>
 which is used to run Spring applications. This class is not only present on 
the broker, but it is an extremely common client-side d [...]
 
 <p>The only known exploit of this vulnerability uses this <code 
class="language-plaintext 
highlighter-rouge">ClassPathXmlApplicationContext</code> to load a malicious 
XML application configuration file from somewhere on the network via HTTP. This 
malicious XML specifically defines the arbitrary code to be run on the machine 
with the vulnerability (i.e. broker or client).</p>
 
-<h4 id="artemis-details">Artemis Details</h4>
+<h4 id="activemq-artemis-details">ActiveMQ Artemis Details</h4>
 
-<p>Artemis supports the OpenWire protocol and therefore has dependencies from 
“Classic” for this support. These dependencies include the vulnerable code. 
However, Artemis doesn’t ship Spring so there is currently no known exploit. 
Regardless, upgrading is still recommended.</p>
+<p>ActiveMQ Artemis supports the OpenWire protocol and therefore has 
dependencies from ActiveMQ Classic for this support. These dependencies include 
the vulnerable code. However, Artemis doesn’t ship Spring so there is currently 
no known exploit. Regardless, upgrading is still recommended.</p>
 
       </div>
     </div>

Reply via email to