
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN417
_____________________________________________________________________

DATE                : 21/07/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache ActiveMQ Artemis versions
                                    prior to 2.14.0.

=====================================================================
http://mail-archives.apache.org/mod_mbox/activemq-users/202007.mbox/%3cCAH+vQmOG4wwooRQBiMad6_0LdeOkcL4YcCiP-C_CQvg4=7FAxg@mail.gmail.com%3e
_____________________________________________________________________


[CVEID]:CVE-2017-5648

Apache ActiveMQ Artemis - Remote XSS in Web console Diagram Plugin

Severity: Medium

Vendor: The Apache Software Foundation

Affected Version: Apache ActiveMQ Artemis 2.5.0 to 2.13.0

Vulnerability details:
A specifically crafted MQTT packet which has an XSS payload as
client-id or topic name can exploit this vulnerability. The XSS
payload is being injected into the admin console's browser. The XSS
payload is triggered in the diagram plugin; queue node and the info
section.

Mitigation:
Upgrade to Apache ActiveMQ Artemis 2.14.0

Credit: This issue was discovered by Arun Magesh from Payatu Software Labs

see:
https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt


=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================




