QID 730021
Date Published: 2021-12-06
QID 730021: Apache ActiveMQ Cross-Site Scripting (XSS) In WebConsole Vulnerability
Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client.
Apache ActiveMQ does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.
Affected Versions:
Apache ActiveMQ prior to 5.15.13 and 5.16.0
QID Detection Logic (Unauthenticated):
This QID tries to get the Apache ActiveMQ versions from admin/index.jsp pages if the target allows unauthenticated access to the admin directory.
Successful exploitation allows remote attackers to execute arbitrary code to preform XXS script.
Solution
Customer are advised to update to Apache ActiveMQ latest versions to remediate this vulnerability.
Vendor References
CVEs related to QID 730021
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ActiveMQ |
|