Apache ActiveMQ 5.x < 5.11.2 Blob Message Directory Traversal

medium Nessus Network Monitor Plugin ID 9079

Synopsis

A web application on the remote host is affected by a directory traversal vulnerability.

Description

Versions 5.x.x of Apache ActiveMQ prior to 5.11.2 are affected by a directory traversal vulnerability due to improper sanitization of user-supplied input in the fileserver upload and download functionality. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to read and upload arbitrary JSP files, resulting in the execution of arbitrary commands.

Solution

Upgrade to ActiveMQ 5.11.2 or later.

See Also

http://www.nessus.org/u?ed82104f

http://activemq.apache.org

Plugin Details

Severity: Medium

ID: 9079

Family: CGI

Published: 2/19/2016

Updated: 3/6/2019

Nessus ID: 85580

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:activemq

Patch Publication Date: 7/19/2015

Vulnerability Publication Date: 7/19/2015

Reference Information

CVE: CVE-2015-1830

BID: 76452