activemq-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Dejan Bosanac (JIRA)" <j...@apache.org>
Subject [jira] Commented: (AMQ-2700) Apache ActiveMQ is prone to source code disclosure vulnerability.
Date Wed, 21 Apr 2010 10:47:17 GMT

    [ https://issues.apache.org/activemq/browse/AMQ-2700?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=59008#action_59008
] 

Dejan Bosanac commented on AMQ-2700:
------------------------------------

This workaround will be available in the next fuse 5.3.1-fuse-01-00 release (http://fusesource.com/),
if anyone is interested.

> Apache ActiveMQ is prone to source code disclosure vulnerability.
> -----------------------------------------------------------------
>
>                 Key: AMQ-2700
>                 URL: https://issues.apache.org/activemq/browse/AMQ-2700
>             Project: ActiveMQ
>          Issue Type: Bug
>    Affects Versions: 5.3.1
>         Environment: Linux/Windows environment
>            Reporter: Veerendra G.G
>            Assignee: Dejan Bosanac
>            Priority: Critical
>             Fix For: 5.4.0
>
>         Attachments: SECPOD_ActiveMQ.txt
>
>
> An input validation error is present in Apache ActiveMQ. Adding '//' after the
> port in an URL causes it to disclose the JSP page source.
> This has been tested on various admin pages,
> admin/index.jsp, admin/queues.jsp, admin/topics.jsp etc.
> NOTE : Refer attached file for complete information/advisory.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


Mime
View raw message