{"id":45229,"date":"2026-04-08T19:11:22","date_gmt":"2026-04-08T11:11:22","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/claude-discovers-apache-activemq-bug-hidden-for-13-years-infosecurity-magazine\/"},"modified":"2026-04-08T19:11:22","modified_gmt":"2026-04-08T11:11:22","slug":"claude-discovers-apache-activemq-bug-hidden-for-13-years-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/claude-discovers-apache-activemq-bug-hidden-for-13-years-infosecurity-magazine\/","title":{"rendered":"Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>An AI-powered vulnerability-hunting effort helped security researchers discover a flaw in Apache ActiveMQ Classic that they claim was &ldquo;hiding in plain sight&rdquo; for over a decade.<\/p>\n<p>Horizon3.ai chief architect, Naveen Sunkavally, explained in a blog post, published on April 7, that remote code execution (RCE) bug CVE-2026-34197 should be treated as a high priority for organizations running the open source message broker.<\/p>\n<p>&ldquo;An attacker can invoke a management operation through ActiveMQ&rsquo;s Jolokia API to trick the broker into fetching a remote configuration file and running arbitrary OS commands,&rdquo; he explained.<\/p>\n<p>&ldquo;The vulnerability requires credentials, but default credentials (admin:admin) are common in many environments. On some versions (6.0.0-6.1.1), no credentials are required at all due to another vulnerability, CVE-2024-32114, which inadvertently exposes the Jolokia API without authentication. In those versions, CVE-2026-34197 is effectively an unauthenticated RCE.&rdquo;<\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/apache-activemq-flaw-exposes-linux\/\" target=\"_blank\"><em>Read more on Apache ActiveMQ vulnerabilities: Flaw in Apache ActiveMQ Exposes Linux Systems to Kinsing Malware.<\/em><\/a><\/p>\n<p>CVE-2026-34197 was patched in ActiveMQ Classic versions 5.19.4 and 6.2.3, so it&rsquo;s recommended that users update and ensure no default credentials are in use.<\/p>\n<p>Organizations concerned they may have been compromised via the RCE bug should look in their ActiveMQ broker logs for network connector activity referencing&nbsp;vm:\/\/&nbsp;URIs with&nbsp;brokerConfig=xbean:http.<\/p>\n<p>Other indicators of compromise include:<\/p>\n<ul>\n<li>POST requests to&nbsp;\/api\/jolokia\/&nbsp;containing&nbsp;addNetworkConnector&nbsp;in the request body<\/li>\n<li>Outbound HTTP requests from the ActiveMQ broker process to unexpected hosts<\/li>\n<li>Unexpected child processes spawned by the ActiveMQ Java process<\/li>\n<\/ul>\n<h2><strong>AI Finds the Flaw<\/strong><\/h2>\n<p>The discovery of CVE-2026-34197 was &ldquo;80% Claude,&rdquo;&nbsp;Anthropic&#39;s AI and &ldquo;20% gift-wrapping by a human,&rdquo; Sunkavally explained.<\/p>\n<p>&ldquo;These days I always use Claude to take a first pass at source code for vulnerability hunting. I prompt it lightly and set up a target on the network for it to validate findings,&rdquo; he said.<\/p>\n<p>&ldquo;A lot of the time, Claude finds interesting stuff but it doesn&rsquo;t quite rise to the level of a CVE I&rsquo;d bother reporting. In this case, it did a great job, with nothing more than a couple of basic prompts.&rdquo;<\/p>\n<p>The flaw had lain hidden for 13 years partly because it involved multiple components developed independently over that time, Sunkavally said. In isolation, each feature looked fine, but they became dangerous when chained together.<\/p>\n<p>&ldquo;This is exactly where Claude shone &ndash; efficiently stitching together this path end to end with a clear head free of assumptions,&rdquo; he <a href=\"https:\/\/horizon3.ai\/attack-research\/disclosures\/cve-2026-34197-activemq-rce-jolokia\/\" target=\"_blank\">continued<\/a>. &ldquo;Something that would have probably taken me a week manually took Claude 10 minutes.&rdquo;<\/p>\n<p>Sunkavally urged appsec engineers and developers to use tools like Claude in their work, claiming that &ldquo;anyone with a security background can take advantage.&rdquo;<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An AI-powered vulnerability-hunting effort helped secur [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-45229","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45229"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45229\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}