IRTUM – Institutional Repository of the Technical University of Moldova

Remote code execution via Log4J MBeans: Case study of Apache ActiveMQ (CVE-2022-41678)

Show simple item record

dc.contributor.author CĂCIULESCU, Alexandru Răzvan
dc.contributor.author BĂDĂNOIU, Matei
dc.contributor.author RUGHINIȘ, Răzvan
dc.contributor.author ȚURCANU, Dinu
dc.date.accessioned 2026-02-22T16:08:20Z
dc.date.available 2026-02-22T16:08:20Z
dc.date.issued 2025
dc.identifier.citation CĂCIULESCU, Alexandru Răzvan; Matei BĂDĂNOIU; Răzvan RUGHINIȘ and Dinu ȚURCANU. Remote code execution via Log4J MBeans: Case study of Apache ActiveMQ (CVE-2022-41678). Computers. 2025, vol. 14, nr. 9, art. nr. 355. ISSN 2073-431X. en_US
dc.identifier.issn 2073-431X
dc.identifier.uri https://doi.org/10.3390/computers14090355
dc.identifier.uri https://repository.utm.md/handle/5014/35382
dc.description Access full text: https://doi.org/10.3390/computers14090355 en_US
dc.description.abstract Java Management Extensions (JMX) are indispensable for managing and administrating Java software solutions, yet when exposed through HTTP bridges such as Jolokia they can radically enlarge an application’s attack surface. This paper presents the first in-depth analysis of CVE-2022-41678, a vulnerability discovered by the authors in Apache ActiveMQ that combines Jolokia’s remote JMX access with Log4J2 management beans to achieve full remote code execution. Using a default installation testbed, we enumerate the Log4J MBeans surfaced by Jolokia, demonstrate arbitrary file read, file write, and server-side request–forgery primitives, and finally to leverage the file write capabilities to obtain a shell, all via authenticated HTTP(S) requests only. The end-to-end exploit chain requires no deserialization gadgets and is unaffected by prior Log4Shell mitigations. We have also automated the entire exploit process via proof-of-concept scripts on a stock ActiveMQ 5.17.1 instance. We discuss the broader security implications for any software exposing JMX-managed or Jolokia-managed Log4J contexts, provide concrete hardening guidelines, and outline design directions for safer remote-management stacks. The findings underscore that even “benign” management beans can become critical when surfaced through ubiquitous HTTP management gateways. en_US
dc.language.iso en en_US
dc.publisher Multidisciplinary Digital Publishing Institute (MDPI) en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject jolokia en_US
dc.subject middleware security en_US
dc.subject vulnerability analysis en_US
dc.title Remote code execution via Log4J MBeans: Case study of Apache ActiveMQ (CVE-2022-41678) en_US
dc.type Article en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Browse

My Account