Apache ActiveMQ Double Slash Request Source Code Disclosure

medium Nessus Plugin ID 45623

Synopsis

The remote web server is affected by an information disclosure vulnerability.

Description

The version of Apache ActiveMQ hosted on the remote web server is affected by a source code disclosure vulnerability in the Jetty ResourceHandler when handling requests to a JSP file with additional leading slashes.
A remote attacker can exploit this to disclose the source code of pages, which may contain passwords and other sensitive information.

Solution

Either upgrade to the latest ActiveMQ 5.4 snapshot or apply the workaround described in the bug report.

See Also

https://www.securityfocus.com/archive/1/510896/30/0/threaded

https://issues.apache.org/jira/browse/AMQ-2700

Plugin Details

Severity: Medium

ID: 45623

File Name: activemq_doubleslash_disclosure.nasl

Version: 1.22

Type: remote

Family: CGI abuses

Published: 4/24/2010

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2010-1587

Vulnerability Information

CPE: cpe:/a:apache:activemq

Required KB Items: installed_sw/Apache ActiveMQ

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 4/21/2010

Vulnerability Publication Date: 4/20/2010

Exploitable With

Elliot (Apache ActiveMQ Source Code Disclosure)

Reference Information

CVE: CVE-2010-1587

BID: 39636