Cross-site Request Forgery (CSRF) The advisory has been revoked - it doesn't affect any version of package org.apache.activemq:activemq-core  (opens in a new tab)


Threat Intelligence

EPSS
0.22% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEACTIVEMQ-480464
  • published10 Jan 2014
  • disclosed5 Apr 2010
  • creditUnknown

Introduced: 5 Apr 2010

CVE-2010-1244  (opens in a new tab)
CWE-352  (opens in a new tab)

Amendment

This was deemed not a vulnerability.

Overview

org.apache.activemq:activemq-web is an open source messaging and Integration Patterns server.

Cross-site request forgery (CSRF) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote attackers to hijack the authentication of unspecified victims for requests that create queues via the JMSDestination parameter in a queue action.

References