Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN425
_____________________________________________________________________

DATE                : 24/04/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache ActiveMQ Broker,
              Apache ActiveMQ All, Apache ActiveMQ versions prior
                                  to 5.19.6, 6.2.5.

=====================================================================
https://activemq.apache.org/security-advisories.data/CVE-2026-40466-announcement.txt
https://activemq.apache.org/security-advisories.data/CVE-2026-41043-announcement.txt
https://activemq.apache.org/security-advisories.data/CVE-2026-41044-announcement.txt
_____________________________________________________________________

Severity: important

Affected versions:

- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.6
- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0 before 6.2.5
- Apache ActiveMQ All (org.apache.activemq:activemq-all) before 5.19.6
- Apache ActiveMQ All (org.apache.activemq:activemq-all) 6.0.0 before 6.2.5
- Apache ActiveMQ (org.apache.activemq:apache-activemq) before 5.19.6
- Apache ActiveMQ (org.apache.activemq:apache-activemq) 6.0.0 before 6.2.5

Description:

Improper Input Validation, Improper Control of Generation of Code
('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache
ActiveMQ All, Apache ActiveMQ.



An authenticated attacker may bypass the fix in CVE-2026-34197 by
adding a connector using an HTTP Discovery transport via
BrokerView.addNetworkConnector or BrokerView.addConnector through Jolokia
if the activemq-http module is on the classpath.
A malicious HTTP endpoint can return a VM transport through the HTTP URI
which will bypass the validation added in CVE-2026-34197. The attacker
can then use the VM transport's brokerConfig parameter to load a remote
Spring XML application context using ResourceXmlApplicationContext.
Because Spring's ResourceXmlApplicationContext instantiates all singleton
beans before the BrokerService validates the configuration, arbitrary
code execution occurs on the broker's JVM through bean factory methods
such as Runtime.exec().


This issue affects Apache ActiveMQ Broker: before 5.19.6, from 6.0.0
before 6.2.5; Apache ActiveMQ All: before 5.19.6, from 6.0.0 before 6.2.5;
Apache ActiveMQ: before 5.19.6, from 6.0.0 before 6.2.5.

Users are recommended to upgrade to version 5.19.6 or 6.2.5, which fixes
the issue.

Credit:

Fatih Ersinadim (finder)
gggggggga (finder)

References:

https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt
https://activemq.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-40466

_____________________________________________________________________

Severity: important

Affected versions:

- Apache ActiveMQ (org.apache.activemq:apache-activemq) before 5.19.6
- Apache ActiveMQ (org.apache.activemq:apache-activemq) 6.0.0 before 6.2.5
- Apache ActiveMQ Web (org.apache.activemq:activemq-web) before 5.19.6
- Apache ActiveMQ Web (org.apache.activemq:activemq-web) 6.0.0 before 6.2.5

Description:

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
vulnerability in Apache ActiveMQ, Apache ActiveMQ Web.

An authenticated attacker can show malicious content when browsing
queues in the web console by overriding the content type to be HTML
(instead of XML) and by injecting HTML into a JMS selector field.

This issue affects Apache ActiveMQ: before 5.19.6, from 6.0.0 before
6.2.5; Apache ActiveMQ Web: before 5.19.6, from 6.0.0 before 6.2.5.

Users are recommended to upgrade to version 6.2.5 or 5.19.6, which
fixes the issue.

Credit:

Khaled Alshammri (finder)

References:

https://activemq.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-41043

_____________________________________________________________________

Severity: important

Affected versions:

- Apache ActiveMQ (org.apache.activemq:apache-activemq) before 5.19.6
- Apache ActiveMQ (org.apache.activemq:apache-activemq) 6.0.0 before 6.2.5
- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.6
- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0 before 6.2.5
- Apache ActiveMQ All (org.apache.activemq:activemq-all) before 5.19.6
- Apache ActiveMQ All (org.apache.activemq:activemq-all) 6.0.0 before 6.2.5

Description:

Improper Input Validation, Improper Control of Generation of Code
('Code Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ
Broker, Apache ActiveMQ All.

An authenticated attacker can use the admin web console page to
construct a malicious broker name that bypasses name validation to
include an xbean binding that can be later used by a VM transport to
load a remote Spring XML application.
The attacker can then use the DestinationView mbean to send a message
to trigger a VM transport creation that will reference this malicious
broker name which can lead to loading the malicious Spring XML context
file.


Because Spring's ResourceXmlApplicationContext instantiates all
singleton beans before the BrokerService validates the configuration,
arbitrary code execution occurs on the broker's JVM through bean
factory methods such as Runtime.exec().

This issue affects Apache ActiveMQ: before 5.19.6, from 6.0.0 before
6.2.5; Apache ActiveMQ Broker: before 5.19.6, from 6.0.0 before 6.2.5;
Apache ActiveMQ All: before 5.19.6, from 6.0.0 before 6.2.5.

Users are recommended to upgrade to version 6.2.5 or 5.19.6, which
fixes the issue.

Credit:

jsjcw (finder)

References:

https://activemq.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-41044


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




