![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFGstHcyeE3cw8w-lZI1nsKY5JYPb67P8606kmhgrU9SSi0xZvUZPB7FSXEOm-xcJdrg_1z_wwjLQnRvUYZgdTMj7ZZtSwViUppJQhOmLDXpEQMLeNYV6KFQY4RKFkV-ZbmAlSVxF8pDCiVjGk1zMFAYr-L_-84vinAAL_oICTpzEHnOxX3uSU3E_abuSZ/s1600/server.jpg)
Cybersecurity researchers have demonstrated a new technique that exploits a critical security flaw in Apache ActiveMQ to achieve arbitrary code execution in memory.
Tracked as CVE-2023-46604 (CVSS score: 10.0), the vulnerability is a remote code execution bug that could permit a threat actor to run arbitrary shell commands.
It was patched by Apache in ActiveMQ versions 5.15.16, 5.16.7, 5.17.6,
Source:: The Hackers News