CVE-2020-11969

If Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.0 - 1.7.5.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomee:7.0.0:m1:*:*:*:*:*:*
cpe:2.3:a:apache:tomee:7.0.0:m2:*:*:*:*:*:*
cpe:2.3:a:apache:tomee:7.0.0:m3:*:*:*:*:*:*
cpe:2.3:a:apache:tomee:8.0.0:m1:*:*:*:*:*:*

History

07 Nov 2023, 03:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E', 'name': '[tomee-dev] 20201223 Re: CVE-2020-13931 is Fake vulnerability', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cusers.tomee.apache.org%3E', 'name': '[tomee-users] 20201216 [SECURITY] CVE-2020-13931 Apache TomEE - Incorrect config on JMS Resource Adapter can lead to JMX being enabled', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cdev.tomee.apache.org%3E', 'name': '[tomee-dev] 20201216 [SECURITY] CVE-2020-13931 Apache TomEE - Incorrect config on JMS Resource Adapter can lead to JMX being enabled', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773@%3Cannounce.apache.org%3E', 'name': '[announce] 20200615 CVE-2020-11969 Apache TomEE - useJMX attribute on ActiveMQ resource adapter URI causes authenticated JMX port to be open', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773%40%3Cannounce.apache.org%3E -
  • () https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E -
  • () https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9%40%3Cdev.tomee.apache.org%3E -
  • () https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cusers.tomee.apache.org%3E -
CWE CWE-287 CWE-306

Information

Published : 2020-06-15 20:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-11969

Mitre link : CVE-2020-11969

CVE.ORG link : CVE-2020-11969


JSON object : View

Products Affected

apache

  • tomee
CWE
CWE-306

Missing Authentication for Critical Function