CVE-2012-6092
LowVulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551.
Known Affected Software
32 configuration(s) from 1 vendor(s)
cpe:2.3:a:apache:activemq:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:3.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:4.1.1:*:*:*:*:*:*:*
References & Resources
-
http://activemq.apache.org/activemq-580-release.htmlsecalert@redhat.com
-
http://rhn.redhat.com/errata/RHSA-2013-1029.htmlsecalert@redhat.com
-
http://www.securityfocus.com/bid/59400secalert@redhat.com
-
https://fisheye6.atlassian.com/changelog/activemq?cs=1399577secalert@redhat.com
-
https://issues.apache.org/jira/browse/AMQ-4115secalert@redhat.com
-
https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12311210&version=12323282secalert@redhat.com
-
http://activemq.apache.org/activemq-580-release.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://rhn.redhat.com/errata/RHSA-2013-1029.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.securityfocus.com/bid/59400af854a3a-2127-422b-91ae-364da2661108
-
https://fisheye6.atlassian.com/changelog/activemq?cs=1399577af854a3a-2127-422b-91ae-364da2661108
-
https://issues.apache.org/jira/browse/AMQ-4115af854a3a-2127-422b-91ae-364da2661108
-
https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12311210&version=12323282af854a3a-2127-422b-91ae-364da2661108
Severity Details
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Description
- The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- OWASP Top 10
- A03:2021-Injection
- Abstraction Level
- Base
Key Information
- Published Date
- April 21, 2013
