<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Apache — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/apache/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 27 Apr 2026 16:09:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/apache/feed.xml" rel="self" type="application/rss+xml"/><item><title>Apache MINA Arbitrary Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-apache-mina-rce/</link><pubDate>Mon, 27 Apr 2026 16:09:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apache-mina-rce/</guid><description>A critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.</description><content:encoded><![CDATA[<p>A critical arbitrary code execution vulnerability, CVE-2026-41635, has been identified in Apache MINA, an open-source network application framework. The vulnerability affects versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5. The flaw lies within the AbstractIoBuffer.resolveClass() method, where a branch lacks class validation, bypassing the classname allowlist. This allows remote attackers with low privileges to execute arbitrary code on systems using Apache MINA when the IoBuffer.getObject() method is called. Successful exploitation can lead to full system compromise, data exfiltration, and further attacks on interconnected systems. It is imperative that organizations using Apache MINA apply the necessary patches immediately to mitigate this critical risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable application using Apache MINA versions 2.0.0-2.0.27, 2.1.0-2.1.10, or 2.2.0-2.2.5.</li>
<li>The attacker crafts a malicious payload containing serialized Java objects designed to exploit the class validation bypass in <code>AbstractIoBuffer.resolveClass()</code>.</li>
<li>The attacker sends a network request to the vulnerable application that triggers the <code>IoBuffer.getObject()</code> method.</li>
<li>The <code>IoBuffer.getObject()</code> method deserializes the attacker-controlled data without proper class validation due to the flaw in <code>AbstractIoBuffer.resolveClass()</code>.</li>
<li>The malicious serialized object executes arbitrary code within the context of the application.</li>
<li>The attacker gains control of the application server.</li>
<li>The attacker uses their access to move laterally within the network.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41635 allows attackers to execute arbitrary code on systems utilizing vulnerable versions of Apache MINA. This can lead to a full compromise of the affected system, including data exfiltration, denial of service, or further attacks on interconnected systems. The vulnerability is remotely exploitable with low privileges, increasing the potential for widespread impact across various sectors relying on Apache MINA for network communication. A successful attack poses a high risk to the confidentiality, integrity, and availability of affected systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Apache MINA to the latest version to remediate CVE-2026-41635, as recommended by the vendor advisory (<a href="https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm)">https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm)</a>.</li>
<li>Implement network monitoring to detect suspicious activity related to deserialization attempts, as suggested by the CCB&rsquo;s recommendation to upscale monitoring capabilities.</li>
<li>Deploy the Sigma rule &ldquo;Detect Apache MINA Vulnerable Class Deserialization Attempt&rdquo; to identify potential exploitation attempts based on suspicious class names in network traffic.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apache-mina</category><category>rce</category><category>deserialization</category><category>cve-2026-41635</category></item><item><title>BridgeHead FileStore Unauthenticated Remote Code Execution via Apache Axis2</title><link>https://feed.craftedsignal.io/briefs/2026-04-bridgehead-filestore-rce/</link><pubDate>Fri, 24 Apr 2026 16:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-bridgehead-filestore-rce/</guid><description>BridgeHead FileStore versions prior to 24A are vulnerable to unauthenticated remote code execution via exposed Apache Axis2 administration module with default credentials, enabling attackers to upload malicious web services and execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>BridgeHead FileStore versions prior to 24A, released in early 2024, expose a critical security vulnerability. Specifically, the Apache Axis2 administration module is accessible on network endpoints with default credentials. This flaw allows unauthenticated remote attackers to execute arbitrary operating system commands. The vulnerability stems from insecure default configurations within the FileStore application and the underlying Axis2 web service framework. Successful exploitation grants complete control over the affected system, potentially leading to data breaches, system compromise, and further lateral movement within the network. This vulnerability poses a significant risk to organizations using vulnerable versions of BridgeHead FileStore.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a BridgeHead FileStore instance running a vulnerable version of the software on a network-accessible endpoint.</li>
<li>The attacker accesses the Apache Axis2 administration console, which is exposed due to a misconfiguration.</li>
<li>The attacker authenticates to the Axis2 admin console using default credentials, bypassing authentication controls.</li>
<li>The attacker uploads a malicious Java archive (WAR file) containing a web service designed to execute arbitrary commands.</li>
<li>The attacker deploys the malicious web service through the Axis2 administration interface.</li>
<li>The attacker crafts a SOAP request to the deployed malicious web service, embedding the operating system command to be executed.</li>
<li>The vulnerable FileStore instance processes the SOAP request, executing the attacker-controlled command on the host operating system.</li>
<li>The attacker gains remote code execution, achieving complete control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39920 allows unauthenticated attackers to execute arbitrary OS commands on systems running vulnerable versions of BridgeHead FileStore. This can lead to complete system compromise, data breaches, denial of service, and further lateral movement within the network. While the exact number of affected organizations is unknown, the widespread use of BridgeHead FileStore in data protection and archiving scenarios makes this a critical vulnerability. The consequences of a successful attack could include the loss of sensitive data, disruption of business operations, and significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the update to FileStore version 24A or later to remediate the vulnerability as mentioned in the product updates page (<a href="https://www.bridgeheadsoftware.com/rapid-data-protection-product-updates/">https://www.bridgeheadsoftware.com/rapid-data-protection-product-updates/</a>).</li>
<li>Monitor web server logs for suspicious POST requests to the Axis2 administration console (<code>/axis2/servlet/AdminServlet</code>) as it is a key component of the exploitation. Use the &ldquo;Detect Axis2 Admin Access&rdquo; Sigma rule to identify unauthorized access attempts.</li>
<li>Implement network segmentation to limit the exposure of BridgeHead FileStore instances and the Axis2 administration module.</li>
<li>Review and enforce strong authentication policies for all web-based administration interfaces.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>cve-2026-39920</category><category>apache axis2</category><category>default credentials</category><category>web service</category></item><item><title>Apache ActiveMQ Vulnerabilities Allow RCE and XSS</title><link>https://feed.craftedsignal.io/briefs/2026-04-activemq-rce-xss/</link><pubDate>Fri, 24 Apr 2026 09:09:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-activemq-rce-xss/</guid><description>An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to execute arbitrary program code or perform cross-site scripting attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in Apache ActiveMQ allow a remote, authenticated attacker to execute arbitrary code or perform cross-site scripting (XSS) attacks. While specific CVEs and attack vectors are not detailed in this advisory, the presence of both RCE and XSS vulnerabilities suggests a high risk to organizations using affected versions of ActiveMQ. Exploitation requires authentication, implying that attackers may need to compromise credentials or exploit other vulnerabilities to gain initial access. This combination of vulnerabilities could lead to complete system compromise, data theft, or service disruption. The lack of specific version information makes it crucial for organizations to identify and patch all potentially vulnerable ActiveMQ instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains valid credentials to access the ActiveMQ management console or API, potentially through credential stuffing, phishing, or exploiting other vulnerabilities.</li>
<li>Authentication: The attacker authenticates to the ActiveMQ instance using the compromised credentials.</li>
<li>Vulnerability Exploitation (RCE): The attacker exploits a deserialization or other RCE vulnerability to inject malicious code into the ActiveMQ server. This may involve crafting a specific message or request to trigger the vulnerability.</li>
<li>Code Execution: The injected code executes within the context of the ActiveMQ server process, granting the attacker control over the system.</li>
<li>Privilege Escalation (if necessary): The attacker attempts to escalate privileges to gain root or system-level access, depending on the initial privileges of the ActiveMQ process.</li>
<li>Lateral Movement: The attacker uses the compromised ActiveMQ server as a pivot point to move laterally within the network, targeting other systems and resources.</li>
<li>Vulnerability Exploitation (XSS): Simultaneously or independently, the attacker exploits an XSS vulnerability within the ActiveMQ web console. This may involve injecting malicious JavaScript code into the console.</li>
<li>Impact: The attacker deploys ransomware, exfiltrates sensitive data, or disrupts critical services, depending on their objectives. The XSS vulnerability allows the attacker to steal administrator cookies or inject further malicious content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to complete compromise of the ActiveMQ server, potentially affecting all connected systems and applications. The lack of specifics makes it difficult to determine the exact number of potential victims; however, given the widespread use of ActiveMQ in enterprise environments, the impact could be significant. Consequences include data breaches, service disruption, financial loss, and reputational damage. The combination of RCE and XSS vulnerabilities allows attackers to pursue a wide range of malicious objectives, from data theft to system destruction.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all Apache ActiveMQ instances within your environment and determine their versions.</li>
<li>Consult the Apache ActiveMQ security advisories to identify specific vulnerabilities affecting your versions and apply the necessary patches.</li>
<li>Implement strong authentication and authorization controls to restrict access to the ActiveMQ management console and API.</li>
<li>Deploy the Sigma rule to detect potential exploitation attempts against ActiveMQ instances.</li>
<li>Review and harden the ActiveMQ configuration to minimize the attack surface and reduce the risk of exploitation.</li>
<li>Implement network segmentation to limit the impact of a successful compromise of an ActiveMQ instance.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>activemq</category><category>rce</category><category>xss</category><category>apache</category></item><item><title>Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment</title><link>https://feed.craftedsignal.io/briefs/2024-01-apache-struts-cve-2023-50164-webshell/</link><pubDate>Fri, 05 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-apache-struts-cve-2023-50164-webshell/</guid><description>Exploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.</description><content:encoded><![CDATA[<p>CVE-2023-50164 is a critical path traversal vulnerability affecting Apache Struts 2 versions prior to 2.5.33 or 6.3.0.2. The vulnerability resides in the file upload functionality, allowing attackers to manipulate file upload parameters and write malicious files, such as JSP web shells, to arbitrary locations on the web server. Successful exploitation leads to remote code execution. Detection focuses on correlating suspicious file upload requests to Struts endpoints with subsequent creation of JSP files in web-accessible directories, indicating successful exploitation. The attack involves crafting malicious multipart/form-data POST requests with WebKitFormBoundary to Struts .action upload endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a malicious HTTP POST request to a vulnerable Apache Struts endpoint (e.g., <code>*.action</code>).</li>
<li>The HTTP POST request contains a <code>multipart/form-data</code> content type with a <code>WebKitFormBoundary</code> string.</li>
<li>The request exploits CVE-2023-50164, leveraging a path traversal vulnerability in the file upload process.</li>
<li>The attacker bypasses security controls due to the path traversal vulnerability.</li>
<li>The attacker uploads a malicious JSP file (web shell) to a web-accessible directory, such as Tomcat&rsquo;s <code>webapps</code> directory.</li>
<li>A Java process (e.g., Tomcat) creates the JSP web shell file in the webapps directory.</li>
<li>The attacker accesses the deployed web shell via HTTP.</li>
<li>The attacker executes arbitrary commands on the server through the web shell.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-50164 allows attackers to achieve remote code execution on the affected server. This can lead to complete system compromise, data exfiltration, deployment of malware, and lateral movement within the network. The vulnerability affects Apache Struts 2 applications using the file upload feature, potentially impacting numerous organizations across various sectors using the framework.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Apache Struts CVE-2023-50164 Webshell Creation&rdquo; to detect JSP file creation events in webapps directories following suspicious POST requests as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;Apache Struts CVE-2023-50164 Suspicious POST Request&rdquo; to detect suspicious POST requests to Struts endpoints with <code>multipart/form-data</code> content containing <code>WebKitFormBoundary</code>, as indicated in the Attack Chain.</li>
<li>Patch Apache Struts 2 to version 2.5.33, 6.3.0.2, or higher to remediate the CVE-2023-50164 vulnerability, as noted in the References.</li>
<li>Enable HTTP request body capture in network traffic monitoring tools to detect the multipart/form-data content containing WebKitFormBoundary indicators, as required by the rule setup.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>apache-struts</category><category>webshell</category><category>cve-2023-50164</category><category>initial-access</category><category>persistence</category><category>command-and-control</category></item><item><title>OpenMRS ModuleResourcesServlet Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-path-traversal/</guid><description>OpenMRS Core versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, contain a path traversal vulnerability in the ModuleResourcesServlet, allowing an unauthenticated attacker to read arbitrary files from the server filesystem by manipulating the URL.</description><content:encoded><![CDATA[<p>OpenMRS Core, a widely used open-source medical record system, is vulnerable to a path traversal attack via the <code>ModuleResourcesServlet</code>. This flaw affects versions up to 2.7.8 and versions 2.8.0 through 2.8.5. An unauthenticated attacker can exploit this vulnerability by crafting a malicious URL to read arbitrary files from the server&rsquo;s filesystem. The vulnerability exists because the <code>ModuleResourcesServlet</code> component fails to properly validate user-supplied path input when serving static module resources. This vulnerability is particularly critical because the affected endpoint is not protected by authentication filters, and successful exploitation depends on running Apache Tomcat versions before 8.5.31 or prior to 9.0.10.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OpenMRS instance running on a susceptible Tomcat version.</li>
<li>The attacker identifies a valid module ID installed on the target OpenMRS instance (e.g., <code>legacyui</code>).</li>
<li>The attacker crafts a malicious HTTP GET request to the <code>/openmrs/moduleResources/{moduleid}</code> endpoint containing a path traversal sequence (e.g., <code>..;</code>) within the URL. The request attempts to access a sensitive file, such as <code>/etc/passwd</code>.</li>
<li>The <code>ModuleResourcesServlet</code> receives the request and extracts the path information without proper validation.</li>
<li>The application constructs a file path by concatenating the web application root, module path, module ID, &ldquo;resources,&rdquo; and the attacker-supplied path.</li>
<li>Due to missing path sanitization and normalization, the resulting file path points to the attacker-specified file outside the intended resources directory.</li>
<li>The server reads the content of the arbitrary file (e.g., <code>/etc/passwd</code>).</li>
<li>The server returns the file content in the HTTP response to the attacker, resulting in information disclosure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an unauthenticated attacker to read arbitrary files on the OpenMRS server. This can lead to the exposure of sensitive information, including system configuration files containing database credentials, potentially compromising the entire application and patient data. The number of affected deployments is unknown, but any OpenMRS instance running vulnerable versions on older Tomcat installations is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenMRS Core to a patched version beyond 2.8.5 to address CVE-2026-40075.</li>
<li>As a short-term mitigation, upgrade Apache Tomcat to version 8.5.31 or later, or 9.0.10 or later, to leverage container-level path traversal protection.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts against the vulnerable <code>ModuleResourcesServlet</code> endpoint.</li>
<li>Monitor web server logs for suspicious URL patterns containing path traversal sequences (<code>../</code>, <code>..;</code>, <code>%2e%2e%2f</code>) targeting the <code>/openmrs/moduleResources/</code> path.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>information-disclosure</category><category>openmrs</category></item></channel></rss>