Cross-site Request Forgery (CSRF) Affecting org.apache.activemq:activemq-web Open this link in a new tab package, versions [,5.3.1)


0.0
medium
  • Attack Complexity

    Low

  • User Interaction

    Required

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHEACTIVEMQ-30499

  • published

    10 Jan 2014

  • disclosed

    5 Apr 2010

  • credit

    Unknown

How to fix?

Upgrade org.apache.activemq:activemq-web to version 5.3.1 or higher.

Overview

org.apache.activemq:activemq-web is a message broker and JMS 1.1 implementation.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF).

Overview

org.apache.activemq:activemq-web is an open source messaging and Integration Patterns server.

Cross-site request forgery (CSRF) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote attackers to hijack the authentication of unspecified victims for requests that create queues via the JMSDestination parameter in a queue action.

References

References