CVE-2026-34197: Apache ActiveMQ Jolokia RCE Vulnerability
好的,我现在需要帮用户总结一篇关于Apache ActiveMQ Classic漏洞的文章,控制在100字以内。用户已经提供了文章内容,我需要先仔细阅读并理解主要内容。 文章主要讲述了CVE-2026-34197这个高危漏洞,它是一个经过身份验证的远程代码执行漏洞。漏洞源于Jolokia JMX-HTTP桥接器处理管理操作的方式,允许攻击者通过构造请求触发远程代码执行。这个漏洞存在了近13年,影响深远。 接下来,我需要提取关键信息:漏洞名称、类型、影响版本、攻击途径以及修复建议。同时,要确保语言简洁明了,不超过100字。 可能的结构是:首先介绍漏洞及其严重性,然后说明攻击途径和影响版本,最后提到修复措施。这样可以全面覆盖主要内容。 现在开始组织语言: Apache ActiveMQ Classic存在高危漏洞CVE-2026-34197,允许经过身份验证的攻击者通过Jolokia API触发远程代码执行。该漏洞已存在近13年,影响5.19.4及以下版本和6.0.0至6.2.3版本。修复建议升级到指定版本或限制Jolokia API访问。 检查字数是否在限制内,并确保信息准确无误。 </think> Apache ActiveMQ Classic 存在高危漏洞 CVE-2026-34197,允许经过身份验证的攻击者通过 Jolokia API 触发远程代码执行。该漏洞已存在近 13 年,影响 5.19.4 及以下版本和 6.0.0 至 6.2.3 版本。修复建议升级到指定版本或限制 Jolokia API 访问。 2026-4-17 11:9:58 Author: securityboulevard.com(查看原文) 阅读量:1 收藏

Apache ActiveMQ Classic, widely used as a messaging backbone in enterprise environments, carries a high-severity vulnerability tracked as CVE-2026-34197. What makes this particularly alarming is its roots. The underlying behavior enabling this vulnerability has existed for nearly 13 years, silently present across countless enterprise deployments.

The vulnerability arises from how the Jolokia JMX-HTTP bridge handles management operations, allowing authenticated users to trigger remote code execution within the broker process. Notably, the underlying behavior enabling this vulnerability has existed for almost 13 years, making it a long-standing risk in affected deployments.

Given ActiveMQ’s role in handling internal message flows and system integrations, exploitation can lead to exposure of sensitive data, credentials, and downstream services, making this a critical risk for affected deployments.

What Is CVE-2026-34197?

CVE-2026-34197 is an authenticated RCE vulnerability caused by unsafe exposure of management operations through the Jolokia API. The vulnerability arises when:

  • The Jolokia endpoint (/api/jolokia/) allows execution of operations on ActiveMQ MBeans
  • Specific operations such as addNetworkConnector accept user-controlled input
  • That input can reference external configuration sources

By invoking these operations with a crafted request, an attacker can force the broker to fetch and process a remote Spring XML configuration file.

Risk Analysis

Severity: High
CVSS v3.1 Base Score: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Availability: No
Exploit Complexity: Low

Access Requirement: Authenticated (default credentials commonly observed)

Impact: Arbitrary code execution on the broker JVM

The vulnerability is remotely exploitable and requires only valid access to the web console. In many environments, default credentials (admin:admin) are still in use, reducing the barrier to exploitation.

On versions 6.0.0 to 6.1.1, this risk increases further when combined with CVE-2024-32114, which exposes the Jolokia endpoint without authentication. In such cases, the vulnerability effectively becomes unauthenticated RCE.

Root Cause of CVE-2026-34197 in Apache ActiveMQ

CVE-2026-34197 results from the interaction of multiple design behaviors in Apache ActiveMQ .

The first factor is the Jolokia JMX-HTTP bridge, which exposes management operations over HTTP. The access policy permits execution (exec) of operations on ActiveMQ MBeans (org.apache.activemq:*), allowing authenticated users to invoke broker-level functions remotely.

The second factor lies in the addNetworkConnector operation, which accepts user-supplied URIs. These URIs can include the brokerConfig parameter, enabling the broker to load configuration from external locations, including remote URLs.

The third factor is how ActiveMQ processes these configurations. When a brokerConfig reference is provided, the broker uses Spring’s ResourceXmlApplicationContext to load the configuration. During this process, all defined beans are instantiated immediately as part of initialization.

When combined, these behaviors create a direct execution path:

  • A remote request invokes a management operation
  • The operation accepts attacker-controlled input
  • The broker loads a remote XML configuration
  • The configuration is processed and executed during initialization

Because execution occurs during the configuration loading phase, any embedded logic in the XML is executed before validation, or safety checks can take effect. This enables arbitrary code execution within the ActiveMQ broker process.

How CVE-2026-34197 is Exploited and its Impact

Exploitation of CVE-2026-34197 begins when an attacker accesses the ActiveMQ web console and interacts with the Jolokia API. In typical scenarios, authenticated access is sufficient, often achievable through default or weak credentials.

The attacker sends a crafted request to the /api/jolokia/ endpoint, invoking a management operation such as addNetworkConnector. This request includes a specially constructed URI containing a brokerConfig parameter that points to an attacker-controlled Spring XML configuration file.

When the broker processes this request, it attempts to establish a network connector using the supplied URI. As part of this process, it fetches the remote XML file and loads it using the application context. During initialization, all defined components within the XML are instantiated, leading to execution of attacker-controlled logic inside the ActiveMQ Java process. This execution inherits the privileges of the running service.

At this stage, the attacker gains code execution on the broker. This allows execution of system-level commands, modification of broker behavior, and deployment of persistent access mechanisms.

Control over the broker also exposes the messaging layer. Attackers can intercept, modify, or inject messages across queues, directly impacting application workflows and data integrity. Since ActiveMQ often connects to backend systems, configuration files and integrations may reveal credentials for databases, directory services, or APIs.

Once access is established, the broker can be used as a pivot point within the network. Depending on its connectivity, attackers can move laterally to other systems and services, extending the scope of compromise beyond the initial host.

Because ActiveMQ is typically embedded within internal infrastructure, exploitation does not remain isolated. It creates a direct path into connected systems and data flows, increasing the overall impact of the vulnerability.

CVE-2026-34197 Affected Versions

The following Apache ActiveMQ versions are affected by CVE-2026-34197:

PRODUCT AFFECTED VERSIONS FIXED VERSION
Apache ActiveMQ Versions before 5.19.4 5.19.4
Apache ActiveMQ Versions 6.0.0 up to (but not including) 6.2.3 6.2.3

Users are recommended to upgrade to version 5.19.4 or 6.2.3 to remediate this vulnerability. ActiveMQ Artemis is not affected.

Threat Hunting & Detection Guidance

Detecting exploitation of CVE-2026-34197 requires visibility across application, broker, and network layers. The attack leverages legitimate management operations, so indicators often appear as normal activity unless correlated carefully.

At the application layer, security teams should monitor requests to the /api/jolokia/ endpoint. Requests invoking operations such as addNetworkConnector, especially those containing parameters like brokerConfig or references to external XML resources, should be treated as suspicious. Repeated or abnormal use of these operations is a strong signal.

At the broker level, ActiveMQ logs provide key indicators. Look for network connector activity involving vm:// URIs combined with brokerConfig=xbean:http. Connection attempts to external configuration URLs, particularly those that repeat, are not typical in normal operations and should be investigated.

System-level behavior also provides visibility. The ActiveMQ Java process should not normally initiate unexpected child processes. Any such activity, along with outbound HTTP requests to unfamiliar hosts, may indicate exploitation.

Network telemetry adds another layer of detection. Outbound connections from the broker to unknown or untrusted systems, especially immediately following Jolokia API activity, should be treated as potential indicators of compromise.

Important: Log entries may include warnings after execution has already occurred. These messages do not indicate failed exploitation.  Detection should focus on identifying abnormal request patterns, broker activity, outbound communication, and error logs as core indicators of potential threats.

CVE: 2026-34197 Mitigation and Remediation

Organizations using affected Apache ActiveMQ versions should upgrade to fixed releases, specifically 5.19.4 or later and 6.2.3 or later, as these versions address the underlying problem.

Where immediate patching is not feasible, access to the Jolokia API should be restricted. If not required, the endpoint should be disabled. If it must remain enabled, access should be limited to non-exec operations to prevent invocation of management functions such as addNetworkConnector.

Access to the ActiveMQ web console should be controlled using strong authentication and network restrictions. Default credentials should be removed, and management interfaces should not be exposed beyond trusted environments.

Network controls should also be enforced to prevent broker systems from making outbound connections to untrusted hosts, reducing the risk of remote configuration loading.

For environments running versions 6.0.0–6.1.1, CVE-2024-32114 should also be patched, as it can expose the Jolokia API without authentication.

AppTrana WAAP Coverage

AppTrana WAAP has extended coverage for CVE-2026-34197 through dedicated detection rules targeting the specific request patterns associated with this vulnerability. Requests invoking sensitive Jolokia operations such as addNetworkConnector, particularly those containing brokerConfig parameters or references to external XML resources, are flagged and blocked before they reach the broker.

This coverage is in place as a proactive control, ensuring that if exploitation attempts emerge, they are intercepted at the perimeter without requiring changes to the underlying ActiveMQ deployment.

Screenshots showing malicious requests targeting the /api/jolokia/ endpoint associated with CVE-2026-34197, detected and blocked by AppTrana WAAP.

AppTrana blocking Jolokia RCE request with 406 response

Jolokia addNetworkConnector exploit blocked by AppTrana

Stay tuned for more relevant and interesting security articles. Follow Indusface on FacebookTwitter, and LinkedIn.

AppTrana WAAP

The post CVE-2026-34197: Apache ActiveMQ Jolokia RCE Vulnerability appeared first on Indusface.

*** This is a Security Bloggers Network syndicated blog from Indusface authored by Deepak Kumar Choudhary. Read the original post at: https://www.indusface.com/blog/cve-2026-34197-apache-activemq-jolokia-vulnerability/


文章来源: https://securityboulevard.com/2026/04/cve-2026-34197-apache-activemq-jolokia-rce-vulnerability/
如有侵权请联系:admin#unsafe.sh