First published: Thu Jul 30 2015(Updated: )
It was found that A-MQ console would accept a string containing javascript as the name of a new message queue. Execution of the UI would subsequently execute the script. An attacker could use this flaw to access sensitive information or perform other attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss A-MQ | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5181 is considered a high severity vulnerability due to its potential for executing arbitrary script code through the A-MQ console.
To fix CVE-2015-5181, update to a patched version of Red Hat JBoss A-MQ that addresses this vulnerability.
An attacker could exploit CVE-2015-5181 to execute malicious scripts, potentially accessing sensitive information or performing unauthorized actions.
CVE-2015-5181 affects versions of Red Hat JBoss A-MQ up to and including 6.0.
CVE-2015-5181 is a remote vulnerability that can be exploited through the A-MQ console over the network.