activemq-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Rajat Swarup (JIRA)" <j...@apache.org>
Subject [jira] Updated: (AMQ-2613) Persistent Cross-site Scripting in /createDesitnation.action [JMSDestination parameter]
Date Wed, 17 Feb 2010 19:38:40 GMT

     [ https://issues.apache.org/activemq/browse/AMQ-2613?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Rajat Swarup updated AMQ-2613:
------------------------------

    Description: 
GET /createDestination.action?JMSDestinationType=queue&JMSDestination=%22%3E%3Cscript%3Ealert%28%22persistent%20XSS%22%29%3C%2fscript%3E
This GET request creates a queue name that has malformed queue name due to lack of input validation.
 After sending this request a sample of the effect can be seen by browsing to /queues.jsp
and clicking on the "Home" link.  
I do not know the affected version information yet.  Is there some way I can find it?    
Additionally, this is vulnerable to cross-site request forgery as well but XSS is a more critical
bug than XSRF (at least at this point for me I guess).

  was:
GET /createDestination.action?JMSDestinationType=queue&JMSDestination=%22%3E%3Cscript%3Ealert%28%22persistent%20XSS%22%29%3C%2fscript%3E
This GET request creates a queue name that has malformed queue name.  After sending this request
a sample of the effect can be seen by browsing to /queues.jsp and clicking on the "Home" link.
 
I do not know the affected version information yet.  Is there some way I can find it?    


Two issues:
- XSS
- XSRF/CSRF


> Persistent Cross-site Scripting in /createDesitnation.action [JMSDestination parameter]
> ---------------------------------------------------------------------------------------
>
>                 Key: AMQ-2613
>                 URL: https://issues.apache.org/activemq/browse/AMQ-2613
>             Project: ActiveMQ
>          Issue Type: Bug
>         Environment: Linux environment.
>            Reporter: Rajat Swarup
>            Priority: Critical
>
> GET /createDestination.action?JMSDestinationType=queue&JMSDestination=%22%3E%3Cscript%3Ealert%28%22persistent%20XSS%22%29%3C%2fscript%3E
> This GET request creates a queue name that has malformed queue name due to lack of input
validation.  After sending this request a sample of the effect can be seen by browsing to
/queues.jsp and clicking on the "Home" link.  
> I do not know the affected version information yet.  Is there some way I can find it?
   
> Additionally, this is vulnerable to cross-site request forgery as well but XSS is a more
critical bug than XSRF (at least at this point for me I guess).

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


Mime
View raw message