Summary
Detail | |||
---|---|---|---|
Vendor | Apache | First view | 2010-04-05 |
Product | Activemq | Last view | 2024-05-02 |
Version | 4.0 | Type | Application |
Update | rc2 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:apache:activemq |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2024-05-02 | CVE-2024-32114 | In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST API). To mitigate, users can update the default conf/jetty.xml configuration file to add authentication requirement: Or we encourage users to upgrade to Apache ActiveMQ 6.1.2 where the default configuration has been updated with authentication by default. |
8.8 | 2023-11-28 | CVE-2022-41678 | Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution. In details, in ActiveMQ configurations, jetty allows org.jolokia.http.AgentServlet to handler request to /api/jolokia org.jolokia.http.HttpRequestHandler#handlePostRequest is able to create JmxRequest through JSONObject. And calls to org.jolokia.http.HttpRequestHandler#executeRequest. Into deeper calling stacks, org.jolokia.handler.ExecHandler#doHandleRequest can be invoked through refection. This could lead to RCE through via various mbeans. One example is unrestricted deserialization in jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11. 1 Call newRecording. 2 Call setConfiguration. And a webshell data hides in it. 3 Call startRecording. 4 Call copyTo method. The webshell will be written to a .jsp file. The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia. A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0. |
9.8 | 2023-10-27 | CVE-2023-46604 | The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary Users are recommended to upgrade |
6.1 | 2021-02-08 | CVE-2020-13947 | An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0. |
7.5 | 2021-01-27 | CVE-2021-26117 | The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password. |
5.9 | 2020-09-10 | CVE-2020-13920 | Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. |
6.1 | 2020-05-14 | CVE-2020-1941 | In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue. |
2.7 | 2019-08-01 | CVE-2015-7559 | It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. |
7.5 | 2019-03-28 | CVE-2019-0222 | In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive. |
6.1 | 2018-10-10 | CVE-2018-8006 | An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter. |
7.4 | 2018-09-10 | CVE-2018-11775 | TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. |
3.7 | 2018-02-13 | CVE-2017-15709 | When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text. |
6.1 | 2018-01-10 | CVE-2016-6810 | In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation. |
9.8 | 2016-06-01 | CVE-2016-3088 | The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. |
7.5 | 2015-08-14 | CVE-2014-3576 | The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command. |
4.3 | 2014-02-05 | CVE-2013-1880 | Cross-site scripting (XSS) vulnerability in the Portfolio publisher servlet in the demo web application in Apache ActiveMQ before 5.9.0 allows remote attackers to inject arbitrary web script or HTML via the refresh parameter to demo/portfolioPublish, a different vulnerability than CVE-2012-6092. |
4.3 | 2013-07-19 | CVE-2013-1879 | Cross-site scripting (XSS) vulnerability in scheduled.jsp in Apache ActiveMQ 5.8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving the "cron of a message." |
6.4 | 2013-04-21 | CVE-2013-3060 | The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests. |
5 | 2013-04-21 | CVE-2012-6551 | The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests. |
4.3 | 2013-04-21 | CVE-2012-6092 | Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551. |
5.8 | 2012-11-04 | CVE-2012-5784 | Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. |
5 | 2012-01-05 | CVE-2011-4905 | Apache ActiveMQ before 5.6.0 allows remote attackers to cause a denial of service (file-descriptor exhaustion and broker crash or hang) by sending many openwire failover:tcp:// connection requests. |
6.8 | 2010-04-05 | CVE-2010-1244 | Cross-site request forgery (CSRF) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote attackers to hijack the authentication of unspecified victims for requests that create queues via the JMSDestination parameter in a queue action. |
3.5 | 2010-04-05 | CVE-2010-0684 | Cross-site scripting (XSS) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote authenticated users to inject arbitrary web script or HTML via the JMSDestination parameter in a queue action. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
40% (8) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
10% (2) | CWE-399 | Resource Management Errors |
10% (2) | CWE-287 | Improper Authentication |
10% (2) | CWE-20 | Improper Input Validation |
5% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
5% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
5% (1) | CWE-306 | Missing Authentication for Critical Function |
5% (1) | CWE-295 | Certificate Issues |
5% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
5% (1) | CWE-200 | Information Exposure |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
77496 | Apache ActiveMQ Failover Mechanism Openwire Request Parsing Remote DoS |
63368 | Apache ActiveMQ createDestination.action JMSDestination Parameter CSRF |
63367 | Apache ActiveMQ createDestination.action JMSDestination Parameter XSS |
OpenVAS Exploits
id | Description |
---|---|
2010-04-16 | Name : Apache ActiveMQ Persistent Cross-Site Scripting Vulnerability File : nvt/gb_activemq_xss_csrf_vuln.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2017-04-06 | Apache ActiveMQ fileserver broker service file delete attempt RuleID : 41811 - Type : SERVER-OTHER - Revision : 3 |
2017-04-06 | Apache ActiveMQ fileserver broker service file upload attempt RuleID : 41810 - Type : SERVER-OTHER - Revision : 2 |
2016-03-14 | Apache ActiveMQ shutdown command denial of service attempt RuleID : 37503 - Type : SERVER-OTHER - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-09-19 | Name: The remote host is running a web application that is affected by a remote cod... File: activemq_5_14_0.nasl - Type: ACT_GATHER_INFO |
2018-09-14 | Name: A web application running on the remote host is affected by an man-in-the-mid... File: activemq_5_15_6.nasl - Type: ACT_GATHER_INFO |
2018-09-14 | Name: A web application running on the remote host is affected by an information di... File: activemq_5_15_3.nasl - Type: ACT_GATHER_INFO |
2018-08-30 | Name: A web application running on the remote host is affected by multiple vulnerab... File: activemq_5_15_5.nasl - Type: ACT_GATHER_INFO |
2017-04-25 | Name: The remote Debian host is missing a security update. File: debian_DLA-913.nasl - Type: ACT_GATHER_INFO |
2017-04-25 | Name: A web application running on the remote host is affected by a denial of servi... File: activemq_5_14_5.nasl - Type: ACT_GATHER_INFO |
2016-12-16 | Name: The remote host is running a web application that is affected by a cross-site... File: activemq_5_14_2.nasl - Type: ACT_GATHER_INFO |
2016-09-02 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL16821.nasl - Type: ACT_GATHER_INFO |
2016-04-26 | Name: The NetIQ Sentinel server installed on the remote host is affected by multipl... File: netiq_sentinel_7_4_1_0.nasl - Type: ACT_GATHER_INFO |
2015-08-13 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3330.nasl - Type: ACT_GATHER_INFO |
2015-03-26 | Name: The remote Debian host is missing a security update. File: debian_DLA-169.nasl - Type: ACT_GATHER_INFO |
2015-02-16 | Name: The remote host has a web application installed that is affected by multiple ... File: activemq_5_10_1.nasl - Type: ACT_GATHER_INFO |
2014-11-08 | Name: The remote Red Hat host is missing a security update. File: redhat-RHSA-2014-1123.nasl - Type: ACT_GATHER_INFO |
2014-11-08 | Name: The remote Red Hat host is missing a security update. File: redhat-RHSA-2014-0037.nasl - Type: ACT_GATHER_INFO |
2013-09-04 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2013-164.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2013-0683.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2013-0269.nasl - Type: ACT_GATHER_INFO |
2013-03-27 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2013-0683.nasl - Type: ACT_GATHER_INFO |
2013-03-26 | Name: The remote Scientific Linux host is missing one or more security updates. File: sl_20130325_axis_on_SL5_x.nasl - Type: ACT_GATHER_INFO |
2013-03-26 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2013-0683.nasl - Type: ACT_GATHER_INFO |
2013-02-21 | Name: The remote Scientific Linux host is missing one or more security updates. File: sl_20130219_axis_on_SL6_x.nasl - Type: ACT_GATHER_INFO |
2013-02-20 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2013-0269.nasl - Type: ACT_GATHER_INFO |
2013-02-04 | Name: The remote Fedora host is missing a security update. File: fedora_2013-1222.nasl - Type: ACT_GATHER_INFO |
2013-02-04 | Name: The remote Fedora host is missing a security update. File: fedora_2013-1194.nasl - Type: ACT_GATHER_INFO |