Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13NTI1LXc5M2otcnhnbc4AATvK
Improper Neutralization of Input During Web Page Generation in Apache ActiveMQ
The web-based administration console in Apache ActiveMQ 5.x before 5.13.2 does not send an X-Frame-Options HTTP header, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web page that contains a (1) FRAME or (2) IFRAME element.
Permalink: https://github.com/advisories/GHSA-w525-w93j-rxgmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13NTI1LXc5M2otcnhnbc4AATvK
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 8 months ago
CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-w525-w93j-rxgm, CVE-2016-0734
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-0734
- https://access.redhat.com/errata/RHSA-2016:1424
- https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E
- http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt
- http://www.openwall.com/lists/oss-security/2016/03/10/11
- https://github.com/apache/activemq/commit/028a33ea7d73fabe6161defffdbfc85578328a68
- https://github.com/apache/activemq/commit/24ad36778534c5ac888f880837075449169578ad
- https://github.com/advisories/GHSA-w525-w93j-rxgm
Blast Radius: 23.2
Affected Packages
maven:org.apache.activemq:activemq-client
Dependent packages: 410Dependent repositories: 6,414
Downloads:
Affected Version Ranges: >= 5.0.0, <= 5.13.1
Fixed in: 5.13.2
All affected versions: 5.8.0, 5.9.0, 5.9.1, 5.10.0, 5.10.1, 5.10.2, 5.11.0, 5.11.1, 5.11.2, 5.11.3, 5.11.4, 5.12.0, 5.12.1, 5.12.2, 5.12.3, 5.13.0, 5.13.1
All unaffected versions: 5.13.2, 5.13.3, 5.13.4, 5.13.5, 5.14.0, 5.14.1, 5.14.2, 5.14.3, 5.14.4, 5.14.5, 5.15.0, 5.15.1, 5.15.2, 5.15.3, 5.15.4, 5.15.5, 5.15.6, 5.15.7, 5.15.8, 5.15.9, 5.15.10, 5.15.11, 5.15.12, 5.15.13, 5.15.14, 5.15.15, 5.15.16, 5.16.0, 5.16.1, 5.16.2, 5.16.3, 5.16.4, 5.16.5, 5.16.6, 5.16.7, 5.17.0, 5.17.1, 5.17.2, 5.17.3, 5.17.4, 5.17.5, 5.17.6, 5.18.0, 5.18.1, 5.18.2, 5.18.3, 5.18.4, 5.18.5, 5.18.6, 6.0.0, 6.0.1, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4