17–19 Sept 2025
Tehnical University of Moldova
Europe/Bucharest timezone

Exploiting Log4J for Remote Code Execution: A Cybersecurity Analysis of the Particularities of CVE-2023-50780 in RedHat AMQ

19 Sept 2025, 11:30
15m
Room 2

Room 2

Technical University of Moldova
Paper presentation Network Security

Speaker

Mr Alexandru Răzvan Căciulescu (National University of Science and Technology POLITEHNICA Bucharest)

Description

Java Management Extensions (JMX) are essential for administrating Java applications, yet their exposure via HTTP bridges like Jolokia can create significant security risks. This paper investigates how vendor-specific modifications in downstream enterprise products can alter the attack surface of known vulnerabilities. Focusing on CVE-2023-50780, we analyze a critical misconfiguration in RedHat AMQ where Log4J's scripting capabilities are enabled by default. This research demonstrates a direct "fire and forget" remote code execution (RCE) vector that is significantly more efficient than the complex, multi-stage file-write exploits documented in its upstream counterpart, Apache ActiveMQ Artemis. Through empirical analysis and a reproducible methodology, we answer our research question by confirming that insecure-by-default settings in commercial products can introduce simpler, more direct attack paths, challenging the assumption that downstream derivatives, even enterprise grade ones, are inherently more secure. Our findings underscore the need for rigorous, independent security validation of vendor-specific configurations in the software supply chain.

Authors

Mr Alexandru Răzvan Căciulescu (National University of Science and Technology POLITEHNICA Bucharest) Mr Matei Bădănoiu (Independent Researcher)

Co-author

Caius Rughiniș (National University of Science and Technology POLITEHNICA Bucharest)

Presentation materials

There are no materials yet.