QID 730021

Date Published: 2021-12-06

QID 730021: Apache ActiveMQ Cross-Site Scripting (XSS) In WebConsole Vulnerability

Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client.

Apache ActiveMQ does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.

Affected Versions:
Apache ActiveMQ prior to 5.15.13 and 5.16.0

QID Detection Logic (Unauthenticated):
This QID tries to get the Apache ActiveMQ versions from admin/index.jsp pages if the target allows unauthenticated access to the admin directory.

Successful exploitation allows remote attackers to execute arbitrary code to preform XXS script.

  • CVSS V3 rated as High - 6.1 severity.
  • CVSS V2 rated as Medium - 4.3 severity.
  • Solution
    Customer are advised to update to Apache ActiveMQ latest versions to remediate this vulnerability.

    CVEs related to QID 730021

    Software Advisories
    Advisory ID Software Component Link
    ActiveMQ URL Logo activemq.apache.org/security-advisories.data/CVE-2020-13947-announcement.txt