org.apache.activemq:apache-activemq@5.3.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.activemq:apache-activemq package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Deserialization of Untrusted Data

org.apache.activemq:apache-activemq is a Message Broker and Client implementations.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the Jolokia component. An attacker can potentially trigger arbitrary code execution by exploiting this vulnerability.

Note:

This is only exploitable if the user is authenticated on Jolokia.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.activemq:apache-activemq to version 5.16.6, 5.17.4 or higher.

[,5.16.6) [5.17.0,5.17.4)
  • M
Information Exposure

org.apache.activemq:apache-activemq is an open source messaging and Integration Patterns server.

Affected versions of this package are vulnerable to Information Exposure.

The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.

[5.0.0,5.3.2) [5.4-alpha,5.4.0)
  • C
Improper Input Validation

org.apache.activemq:apache-activemq is an open source messaging and Integration Patterns server.

The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.

[5.0.0,5.13.3)
  • C
XML External Entity (XXE) Injection

org.apache.activemq:apache-activemq is a Message Broker and Client implementations.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. This could allow remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.activemq:apache-activemq to version 5.10.1 or higher.

[5.0.0,5.10.1)
  • M
Directory Traversal

org.apache.activemq:apache-activemq is a Message Broker and Client implementations.

Affected versions of this package are vulnerable to Directory Traversal in the fileserver upload/download functionality for blob messages. It allows remote attackers to create JSP files in arbitrary directories via unspecified vectors.

How to fix Directory Traversal?

Upgrade org.apache.activemq:apache-activemq to version 5.11.2 or higher.

[5.0.0,5.11.2)
  • M
Denial of Service (DoS)

org.apache.activemq:apache-activemq is a Message Broker and Client implementations.

Affected versions of this package are vulnerable to Denial of Service (DoS). The default configuration enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests.

How to fix Denial of Service (DoS)?

Upgrade org.apache.activemq:apache-activemq to version 5.8.0 or higher.

[,5.8.0)