Cybersecurity researchers recently uncovered a critical vulnerability in Apache ActiveMQ, identified as CVE-2023-46604 (CVSS score: 10.0). This flaw facilitates remote code execution, granting threat actors the capability to execute arbitrary shell commands. To address this issue, Apache has released the latest versions—5.15.16, 5.16.7, 5.17.6, or 5.18.3—last month, aimed at mitigating the risk posed by this vulnerability. Regrettably, cybercriminals have already begun exploiting this weakness. Ransomware groups, such as HelloKitty—a variant akin to TellYouThePass—and the deployment of Spark RAT, have all utilized this vulnerability. The exploitation involves using a public proof-of-concept (PoC) exploit disclosed on October 25, 2023. Attackers leverage the ClassPathXmlApplicationContext available within ActiveMQ via the Spring framework to load a malicious XML bean configuration file through HTTP, enabling unauthenticated remote code execution on servers. Further analysis by VulnCheck revealed a more sophisticated approach. By employing the FileSystemXmlApplicationContext class and crafting a SpEL expression, attackers can achieve identical results without leaving traces on the disk. However, this method triggers an exception message in the activemq.log file, necessitating additional steps to erase forensic evidence. Jacob Baines, VulnCheck's Chief Technology Officer, stressed the urgency of patching ActiveMQ servers and advocated for removing them from public internet access. He cautioned that with the potential for stealthy attacks using CVE-2023-46604, securing systems is crucial to prevent exploitation. The disclosure of this vulnerability underscores the critical need for immediate action, including prompt patching and enhanced security measures, to shield against potential exploits.
IBM released security patches for over 100 vulnerabilities across various products. The biggest sufferers of these patches were Storage Defender, for which patches were issued for ...
Fieldtex Products, a U.S.-based provider of contract sewing and medical supply fulfillment, has reported a data breach following an attack attributed to a well-known ransomware ope...
The Pierce County Library System (PCLS) has announced a major data breach affecting more than 340,000 individuals, including library patrons, employees, former employees, and some ...