Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04cmNxLXA0Z2gtdm1qOM4AATvJ
Improper Neutralization of Input During Web Page Generation in Apache ActiveMQ
The administration web console in Apache ActiveMQ 5.x before 5.11.4, 5.12.x before 5.12.3, and 5.13.x before 5.13.2 allows remote authenticated users to conduct cross-site scripting (XSS) attacks and consequently obtain sensitive information from a Java memory dump via vectors related to creating a queue.
Permalink: https://github.com/advisories/GHSA-8rcq-p4gh-vmj8JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04cmNxLXA0Z2gtdm1qOM4AATvJ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 8 months ago
CVSS Score: 5.4
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-8rcq-p4gh-vmj8, CVE-2016-0782
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-0782
- https://access.redhat.com/errata/RHSA-2016:1424
- https://bugzilla.redhat.com/show_bug.cgi?id=1317516
- https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E
- http://activemq.apache.org/security-advisories.data/CVE-2016-0782-announcement.txt
- http://packetstormsecurity.com/files/136215/Apache-ActiveMQ-5.13.0-Cross-Site-Scripting.html
- https://github.com/apache/activemq/commit/0c9fdb5b4180c1ae800bbc8bae7a2c0620f6749b
- https://github.com/apache/activemq/commit/2061186a0a2486aebf26c4ceb8126933ed01826e
- https://github.com/apache/activemq/commit/7828069637acb2f1ca1710523f6a2b216c12c7f8
- https://github.com/apache/activemq/compare/activemq-5.13.1...activemq-5.13.2
- https://github.com/advisories/GHSA-8rcq-p4gh-vmj8
Blast Radius: 20.6
Affected Packages
maven:org.apache.activemq:activemq-client
Dependent packages: 410Dependent repositories: 6,414
Downloads:
Affected Version Ranges: >= 5.13.0, <= 5.13.1, >= 5.12.0, <= 5.12.2, >= 5.0.0, <= 5.11.3
Fixed in: 5.13.2, 5.12.3, 5.11.4
All affected versions: 5.8.0, 5.9.0, 5.9.1, 5.10.0, 5.10.1, 5.10.2, 5.11.0, 5.11.1, 5.11.2, 5.11.3, 5.12.0, 5.12.1, 5.12.2, 5.13.0, 5.13.1
All unaffected versions: 5.11.4, 5.12.3, 5.13.2, 5.13.3, 5.13.4, 5.13.5, 5.14.0, 5.14.1, 5.14.2, 5.14.3, 5.14.4, 5.14.5, 5.15.0, 5.15.1, 5.15.2, 5.15.3, 5.15.4, 5.15.5, 5.15.6, 5.15.7, 5.15.8, 5.15.9, 5.15.10, 5.15.11, 5.15.12, 5.15.13, 5.15.14, 5.15.15, 5.15.16, 5.16.0, 5.16.1, 5.16.2, 5.16.3, 5.16.4, 5.16.5, 5.16.6, 5.16.7, 5.17.0, 5.17.1, 5.17.2, 5.17.3, 5.17.4, 5.17.5, 5.17.6, 5.18.0, 5.18.1, 5.18.2, 5.18.3, 5.18.4, 5.18.5, 5.18.6, 6.0.0, 6.0.1, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4