First published: Sun Apr 21 2013(Updated: )
Apache ActiveMQ is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by multiple vectors. A remote attacker could exploit this vulnerability using various parameters in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Directory Suite VA | <=8.0.1-8.0.1.19 | |
Apache ActiveMQ | <=5.7.0 | |
Apache ActiveMQ | =4.0 | |
Apache ActiveMQ | =4.0-m4 | |
Apache ActiveMQ | =4.0-rc2 | |
Apache ActiveMQ | =4.0.1 | |
Apache ActiveMQ | =4.0.2 | |
Apache ActiveMQ | =4.1.0 | |
Apache ActiveMQ | =4.1.1 | |
Apache ActiveMQ | =5.0.0 | |
Apache ActiveMQ | =5.1.0 | |
Apache ActiveMQ | =5.2.0 | |
Apache ActiveMQ | =5.3.0 | |
Apache ActiveMQ | =5.3.1 | |
Apache ActiveMQ | =5.3.2 | |
Apache ActiveMQ | =5.4.0 | |
Apache ActiveMQ | =5.4.1 | |
Apache ActiveMQ | =5.4.2 | |
Apache ActiveMQ | =5.5.0 | |
Apache ActiveMQ | =5.5.1 | |
Apache ActiveMQ | =5.6.0 | |
maven/org.apache.activemq:activemq-core | <5.8.0 | 5.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6092 is a vulnerability in Apache ActiveMQ that allows remote attackers to execute script in a victim's web browser.
CVE-2012-6092 affects Apache ActiveMQ by enabling cross-site scripting attacks, allowing remote attackers to inject and execute malicious script in a victim's web browser.
CVE-2012-6092 has a severity rating of 4.3 (Medium).
To fix CVE-2012-6092, update Apache ActiveMQ to version 5.8.0 or later, which includes the necessary patch to address the vulnerability.
You can find more information about CVE-2012-6092 on the Apache ActiveMQ website, the Red Hat Customer Portal, and the SecurityFocus website.