Search for packages
| purl | pkg:deb/debian/activemq@5.14.3-3 |
| Next non-vulnerable version | 5.17.6+dfsg-2 |
| Latest non-vulnerable version | 5.17.6+dfsg-2 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-18k1-3h2s-8uex
Aliases: CVE-2020-1941 GHSA-cc94-3v9c-7rm8 |
Apache ActiveMQ webconsole admin GUI is open to XSS In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue. |
Affected by 3 other vulnerabilities. |
|
VCID-37ws-cqf7-4udm
Aliases: CVE-2020-13947 GHSA-66gw-ch5v-74v8 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0. |
Affected by 3 other vulnerabilities. |
|
VCID-5kmj-whmc-4bfa
Aliases: CVE-2017-15709 GHSA-7qm4-p377-fr2r |
When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text. |
Affected by 8 other vulnerabilities. |
|
VCID-6fqa-fzda-x3ej
Aliases: CVE-2021-26117 GHSA-9mgm-gcq8-86wq |
Improper Authentication in Apache ActiveMQ and Apache Artemis The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password. |
Affected by 3 other vulnerabilities. |
|
VCID-9z4y-wq57-vyaf
Aliases: CVE-2019-0222 GHSA-jpv3-g4cc-6vfx |
Code Injection In Apache ActiveMQ, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive. |
Affected by 3 other vulnerabilities. |
|
VCID-a3nb-p5p6-zbf7
Aliases: CVE-2020-13920 GHSA-xgrx-xpv2-6vp4 |
Missing Authentication for Critical Function Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. |
Affected by 3 other vulnerabilities. |
|
VCID-f5x2-zvxa-yba5
Aliases: CVE-2023-46604 GHSA-crg9-44h2-xw35 |
False positive This advisory has been marked as a false positive. |
Affected by 1 other vulnerability. |
|
VCID-fb7w-5fvt-zqe3
Aliases: CVE-2018-8006 GHSA-hvwm-2624-rp9x |
Cross-site Scripting An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the `queue.jsp` page of Apache ActiveMQ. |
Affected by 8 other vulnerabilities. |
|
VCID-k4jb-36cp-1fc4
Aliases: CVE-2022-41678 GHSA-53v4-42fg-g287 |
False positive This advisory has been marked as a false positive. |
Affected by 1 other vulnerability. |
|
VCID-q6zs-spcv-v7ey
Aliases: CVE-2025-27533 GHSA-whxr-3p84-rf3c |
Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ. During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on the availability of the ActiveMQ broker when not using mutual TLS connections. This issue affects Apache ActiveMQ: from 6.0.0 before 6.1.6, from 5.18.0 before 5.18.7, from 5.17.0 before 5.17.7, before 5.16.8. ActiveMQ 5.19.0 is not affected. Users are recommended to upgrade to version 6.1.6+, 5.19.0+, 5.18.7+, 5.17.7, or 5.16.8 or which fixes the issue. Existing users may implement mutual TLS to mitigate the risk on affected brokers. |
Affected by 1 other vulnerability. Affected by 0 other vulnerabilities. |
|
VCID-xttf-9hx8-fbdb
Aliases: CVE-2018-11775 GHSA-m9w8-v359-9ffr |
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. |
Affected by 8 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-brq9-y937-8faz | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The administration web console in Apache ActiveMQ 5.x before 5.11.4, 5.12.x before 5.12.3, and 5.13.x before 5.13.2 allows remote authenticated users to conduct cross-site scripting (XSS) attacks and consequently obtain sensitive information from a Java memory dump via vectors related to creating a queue. |
CVE-2016-0782
GHSA-8rcq-p4gh-vmj8 |
| VCID-nq1y-96n5-eugd | The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. |
CVE-2016-3088
GHSA-rxqh-fc23-gxp2 |
| VCID-pf5e-93cg-guav | Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. |
CVE-2015-5254
GHSA-q9hr-3pg4-3jp4 |
| VCID-uw15-q255-zbe8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation. |
CVE-2016-6810
GHSA-5jg4-p78r-p5j3 |
| VCID-y7sj-71h1-3qhr | It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. |
CVE-2015-7559
GHSA-jvpp-hxjj-5ccc |