Apache ActiveMQ Client 5.x < 5.15.6 TLS Hostname Verification Weakness

high Nessus Plugin ID 117483

Synopsis

A web application running on the remote host is affected by an man-in-the-middle vulnerability.

Description

The version of Apache ActiveMQ running on the remote host is 5.x prior to 5.15.6. It is, therefore, affected by a flaw related to TLS hostname verification and ActiveMQ Client that allows man-in-the-middle attacks.

Solution

Upgrade to Apache ActiveMQ version 5.15.6 or later.

See Also

http://www.nessus.org/u?2be62caa

https://activemq.apache.org/activemq-5156-release.html

Plugin Details

Severity: High

ID: 117483

File Name: activemq_5_15_6.nasl

Version: 1.8

Type: combined

Agent: unix

Family: CGI abuses

Published: 9/14/2018

Updated: 6/6/2024

Configuration: Enable thorough checks

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2018-11775

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:activemq

Required KB Items: installed_sw/Apache ActiveMQ

Exploit Ease: No known exploits are available

Patch Publication Date: 9/4/2018

Vulnerability Publication Date: 9/10/2018

Reference Information

CVE: CVE-2018-11775

BID: 105335