CVE-2020-13920

NameCVE-2020-13920
DescriptionApache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2400-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
activemq (PTS)buster5.15.8-2vulnerable
bullseye5.16.1-1fixed
bookworm, sid5.17.2+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
activemqsourcestretch5.14.3-3+deb9u1DLA-2400-1
activemqsource(unstable)5.16.0-1

Notes

[buster] - activemq <no-dsa> (Minor issue; can be fixed via point release)
http://activemq.apache.org/security-advisories.data/CVE-2020-13920-announcement.txt
When fixing this issue make sure to use a complete fix and not open up
CVE-2020-11998 (a regression introduced in 5.15.12 in the commit preventing
JMX re-bind).
Fixed by: https://github.com/apache/activemq/commit/c29244931d54affaceabb478b3a52d9b74f5d543 (activemq-5.15.12)
Followup needed: https://github.com/apache/activemq/commit/0d6e5f240ef34bae2e4089102047593bef628e6c (activemq-5.15.13)

Search for package or bug name: Reporting problems