CVE-2014-3612: Improper Authentication
(updated )
The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames.
References
- activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt
- rhn.redhat.com/errata/RHSA-2015-0137.html
- rhn.redhat.com/errata/RHSA-2015-0138.html
- seclists.org/oss-sec/2015/q1/427
- github.com/advisories/GHSA-72m6-23ff-7q26
- lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2014-3612
Detect and mitigate CVE-2014-3612 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →