Severity: moderate

Affected versions:

- Apache ActiveMQ NMS OpenWire Client before 2.1.1

Description:

Deserialization of Untrusted Data vulnerability in Apache ActiveMQ NMS OpenWire 
Client.

This issue affects Apache ActiveMQ NMS OpenWire Client before 2.1.1 when 
performing connections to untrusted servers. Such servers could abuse the 
unbounded deserialization in the client to provide malicious responses that may 
eventually cause arbitrary code execution on the client. Version 2.1.0 
introduced a allow/denylist feature to restrict deserialization, but this 
feature could be bypassed.

The .NET team has deprecated the built-in .NET binary serialization feature 
starting with .NET 9 and suggests migrating away from binary serialization. The 
project is considering to follow suit and drop this part of the NMS API 
altogether.

Users are recommended to upgrade to version 2.1.1, which fixes the issue. We 
also recommend to migrate away from relying on .NET binary serialization as a 
hardening method for the future.

This issue is being tracked as AMQNET-844 

Credit:

g7shot working with Trend Zero Day Initiative (finder)

References:

https://activemq.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-29953
https://issues.apache.org/jira/browse/AMQNET-844


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@activemq.apache.org
For additional commands, e-mail: users-h...@activemq.apache.org
For further information, visit: https://activemq.apache.org/contact


Reply via email to