Search for packages
| purl | pkg:deb/debian/activemq@5.6.0%2Bdfsg1-4 |
| Next non-vulnerable version | 5.17.6+dfsg-2 |
| Latest non-vulnerable version | 5.17.6+dfsg-2 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-18k1-3h2s-8uex
Aliases: CVE-2020-1941 GHSA-cc94-3v9c-7rm8 |
Apache ActiveMQ webconsole admin GUI is open to XSS In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue. |
Affected by 3 other vulnerabilities. |
|
VCID-37ws-cqf7-4udm
Aliases: CVE-2020-13947 GHSA-66gw-ch5v-74v8 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0. |
Affected by 3 other vulnerabilities. |
|
VCID-5kmj-whmc-4bfa
Aliases: CVE-2017-15709 GHSA-7qm4-p377-fr2r |
When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text. |
Affected by 8 other vulnerabilities. |
|
VCID-6fqa-fzda-x3ej
Aliases: CVE-2021-26117 GHSA-9mgm-gcq8-86wq |
Improper Authentication in Apache ActiveMQ and Apache Artemis The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password. |
Affected by 3 other vulnerabilities. |
|
VCID-9z4y-wq57-vyaf
Aliases: CVE-2019-0222 GHSA-jpv3-g4cc-6vfx |
Code Injection In Apache ActiveMQ, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive. |
Affected by 3 other vulnerabilities. |
|
VCID-a3nb-p5p6-zbf7
Aliases: CVE-2020-13920 GHSA-xgrx-xpv2-6vp4 |
Missing Authentication for Critical Function Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. |
Affected by 3 other vulnerabilities. |
|
VCID-brq9-y937-8faz
Aliases: CVE-2016-0782 GHSA-8rcq-p4gh-vmj8 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The administration web console in Apache ActiveMQ 5.x before 5.11.4, 5.12.x before 5.12.3, and 5.13.x before 5.13.2 allows remote authenticated users to conduct cross-site scripting (XSS) attacks and consequently obtain sensitive information from a Java memory dump via vectors related to creating a queue. |
Affected by 11 other vulnerabilities. |
|
VCID-bws5-1j6c-g7f3
Aliases: CVE-2014-3576 GHSA-3wfj-vh84-732p |
The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command. |
Affected by 16 other vulnerabilities. |
|
VCID-f5x2-zvxa-yba5
Aliases: CVE-2023-46604 GHSA-crg9-44h2-xw35 |
False positive This advisory has been marked as a false positive. |
Affected by 1 other vulnerability. |
|
VCID-fb7w-5fvt-zqe3
Aliases: CVE-2018-8006 GHSA-hvwm-2624-rp9x |
Cross-site Scripting An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the `queue.jsp` page of Apache ActiveMQ. |
Affected by 8 other vulnerabilities. |
|
VCID-k4jb-36cp-1fc4
Aliases: CVE-2022-41678 GHSA-53v4-42fg-g287 |
False positive This advisory has been marked as a false positive. |
Affected by 1 other vulnerability. |
|
VCID-nq1y-96n5-eugd
Aliases: CVE-2016-3088 GHSA-rxqh-fc23-gxp2 |
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. |
Affected by 11 other vulnerabilities. |
|
VCID-pf5e-93cg-guav
Aliases: CVE-2015-5254 GHSA-q9hr-3pg4-3jp4 |
Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. |
Affected by 16 other vulnerabilities. Affected by 11 other vulnerabilities. |
|
VCID-q6zs-spcv-v7ey
Aliases: CVE-2025-27533 GHSA-whxr-3p84-rf3c |
Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ. During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on the availability of the ActiveMQ broker when not using mutual TLS connections. This issue affects Apache ActiveMQ: from 6.0.0 before 6.1.6, from 5.18.0 before 5.18.7, from 5.17.0 before 5.17.7, before 5.16.8. ActiveMQ 5.19.0 is not affected. Users are recommended to upgrade to version 6.1.6+, 5.19.0+, 5.18.7+, 5.17.7, or 5.16.8 or which fixes the issue. Existing users may implement mutual TLS to mitigate the risk on affected brokers. |
Affected by 1 other vulnerability. Affected by 0 other vulnerabilities. |
|
VCID-uw15-q255-zbe8
Aliases: CVE-2016-6810 GHSA-5jg4-p78r-p5j3 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation. |
Affected by 11 other vulnerabilities. |
|
VCID-xttf-9hx8-fbdb
Aliases: CVE-2018-11775 GHSA-m9w8-v359-9ffr |
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. |
Affected by 8 other vulnerabilities. |
|
VCID-y7sj-71h1-3qhr
Aliases: CVE-2015-7559 GHSA-jvpp-hxjj-5ccc |
It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. |
Affected by 11 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-4x3q-h212-duaz | XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages. |
CVE-2014-3600
GHSA-4vhf-2hv7-8mrx |
| VCID-gxt8-xcsg-3kes | The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames. |
CVE-2014-3612
GHSA-72m6-23ff-7q26 |
| VCID-rkj1-fqpn-cyfk | The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types. |
CVE-2015-6524
GHSA-23cr-5hr4-rgwv |