Search for packages
| purl | pkg:deb/debian/activemq@5.16.1-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-18k1-3h2s-8uex | Apache ActiveMQ webconsole admin GUI is open to XSS In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue. |
CVE-2020-1941
GHSA-cc94-3v9c-7rm8 |
| VCID-3222-6uvd-7be5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Multiple cross-site scripting (XSS) vulnerabilities in the web based administration console in Apache ActiveMQ 5.x before 5.10.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
CVE-2014-8110
GHSA-9cvr-8xq4-2m73 |
| VCID-37ws-cqf7-4udm | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0. |
CVE-2020-13947
GHSA-66gw-ch5v-74v8 |
| VCID-4up3-b171-g7aj | Apache ActiveMQ default configuration subject to denial of service The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests. |
CVE-2012-6551
GHSA-34fp-xvxp-rg22 |
| VCID-4x3q-h212-duaz | XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages. |
CVE-2014-3600
GHSA-4vhf-2hv7-8mrx |
| VCID-5kmj-whmc-4bfa | When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text. |
CVE-2017-15709
GHSA-7qm4-p377-fr2r |
| VCID-6fqa-fzda-x3ej | Improper Authentication in Apache ActiveMQ and Apache Artemis The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password. |
CVE-2021-26117
GHSA-9mgm-gcq8-86wq |
| VCID-99na-8tpm-syh1 | The web-based administration console in Apache ActiveMQ 5.x before 5.13.2 does not send an X-Frame-Options HTTP header, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web page that contains a (1) FRAME or (2) IFRAME element. |
CVE-2016-0734
GHSA-w525-w93j-rxgm |
| VCID-9z4y-wq57-vyaf | Code Injection In Apache ActiveMQ, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive. |
CVE-2019-0222
GHSA-jpv3-g4cc-6vfx |
| VCID-a3nb-p5p6-zbf7 | Missing Authentication for Critical Function Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. |
CVE-2020-13920
GHSA-xgrx-xpv2-6vp4 |
| VCID-a7j9-mzvg-cycr | Cross-site scripting (XSS) vulnerability in the Portfolio publisher servlet in the demo web application in Apache ActiveMQ before 5.9.0 allows remote attackers to inject arbitrary web script or HTML via the refresh parameter to demo/portfolioPublish, a different vulnerability than CVE-2012-6092. |
CVE-2013-1880
GHSA-c9gx-27hq-wcvj |
| VCID-anw6-f8f2-q3hx | Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551. |
CVE-2012-6092
GHSA-rp9p-863f-9c4h |
| VCID-brq9-y937-8faz | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The administration web console in Apache ActiveMQ 5.x before 5.11.4, 5.12.x before 5.12.3, and 5.13.x before 5.13.2 allows remote authenticated users to conduct cross-site scripting (XSS) attacks and consequently obtain sensitive information from a Java memory dump via vectors related to creating a queue. |
CVE-2016-0782
GHSA-8rcq-p4gh-vmj8 |
| VCID-bws5-1j6c-g7f3 | The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command. |
CVE-2014-3576
GHSA-3wfj-vh84-732p |
| VCID-cuhh-zgq5-n3gr | Apache ActiveMQ before 5.6.0 allows remote attackers to cause a denial of service (file-descriptor exhaustion and broker crash or hang) by sending many openwire failover:tcp:// connection requests. |
CVE-2011-4905
GHSA-9wcx-326r-7j7w |
| VCID-f5x2-zvxa-yba5 | False positive This advisory has been marked as a false positive. |
CVE-2023-46604
GHSA-crg9-44h2-xw35 |
| VCID-fb7w-5fvt-zqe3 | Cross-site Scripting An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the `queue.jsp` page of Apache ActiveMQ. |
CVE-2018-8006
GHSA-hvwm-2624-rp9x |
| VCID-gxt8-xcsg-3kes | The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames. |
CVE-2014-3612
GHSA-72m6-23ff-7q26 |
| VCID-k4jb-36cp-1fc4 | False positive This advisory has been marked as a false positive. |
CVE-2022-41678
GHSA-53v4-42fg-g287 |
| VCID-nq1y-96n5-eugd | The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. |
CVE-2016-3088
GHSA-rxqh-fc23-gxp2 |
| VCID-pe37-xakm-3qb4 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13 |
CVE-2020-11998
GHSA-wqfh-9m4g-7x6x |
| VCID-pf5e-93cg-guav | Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. |
CVE-2015-5254
GHSA-q9hr-3pg4-3jp4 |
| VCID-q6zs-spcv-v7ey | Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ. During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on the availability of the ActiveMQ broker when not using mutual TLS connections. This issue affects Apache ActiveMQ: from 6.0.0 before 6.1.6, from 5.18.0 before 5.18.7, from 5.17.0 before 5.17.7, before 5.16.8. ActiveMQ 5.19.0 is not affected. Users are recommended to upgrade to version 6.1.6+, 5.19.0+, 5.18.7+, 5.17.7, or 5.16.8 or which fixes the issue. Existing users may implement mutual TLS to mitigate the risk on affected brokers. |
CVE-2025-27533
GHSA-whxr-3p84-rf3c |
| VCID-rkj1-fqpn-cyfk | The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types. |
CVE-2015-6524
GHSA-23cr-5hr4-rgwv |
| VCID-rsxq-hkds-vueh | Improper Authentication in Apache ActiveMQ The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests. |
CVE-2013-3060
GHSA-p358-58jj-hp65 |
| VCID-tyaw-6dpw-mudm | Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT vulnerable to Integer Overflow or Wraparound Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT. The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions. This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4. Users are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue. |
CVE-2026-40046
GHSA-xvqc-pp94-fmpx |
| VCID-uc2f-713u-skcc | Cross-site scripting (XSS) vulnerability in scheduled.jsp in Apache ActiveMQ 5.8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving the "cron of a message." |
CVE-2013-1879
GHSA-mfhr-3xmc-r2gg |
| VCID-uw15-q255-zbe8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation. |
CVE-2016-6810
GHSA-5jg4-p78r-p5j3 |
| VCID-vbqu-ak2c-gqez | Directory traversal vulnerability in the fileserver upload/download functionality for blob messages in Apache ActiveMQ 5.x before 5.11.2 for Windows allows remote attackers to create JSP files in arbitrary directories via unspecified vectors. |
CVE-2015-1830
GHSA-3v63-f83x-37x4 |
| VCID-wema-7dnk-bkhy | Apache ActiveMQ's default configuration doesn't secure the API web context In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST API). To mitigate, users can update the default conf/jetty.xml configuration file to add authentication requirement: <bean id="securityConstraintMapping" class="org.eclipse.jetty.security.ConstraintMapping"> <property name="constraint" ref="securityConstraint" /> <property name="pathSpec" value="/" /> </bean> Or we encourage users to upgrade to Apache ActiveMQ 6.1.2 where the default configuration has been updated with authentication by default. |
CVE-2024-32114
GHSA-gj5m-m88j-v7c3 |
| VCID-xttf-9hx8-fbdb | TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. |
CVE-2018-11775
GHSA-m9w8-v359-9ffr |
| VCID-y7sj-71h1-3qhr | It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. |
CVE-2015-7559
GHSA-jvpp-hxjj-5ccc |