First published: Wed Jan 10 2018(Updated: )
Apache ActiveMQ is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Directory Suite VA | <=8.0.1-8.0.1.19 | |
Apache ActiveMQ | >=5.0.0<5.14.2 | |
maven/org.apache.activemq:activemq-client | >=5.0.0<=5.14.1 | 5.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2016-6810.
The severity level of CVE-2016-6810 is medium (6.1).
The affected software for CVE-2016-6810 is Apache ActiveMQ version 5.x before 5.14.2 and IBM Security Directory Suite VA version 8.0.1-8.0.1.19.
An attacker can exploit CVE-2016-6810 by sending a specially-crafted URL to a victim, which when clicked, executes malicious script in the victim's web browser.
Yes, you can refer to the following links for more information about CVE-2016-6810: 1. http://activemq.apache.org/security-advisories.data/CVE-2016-6810-announcement.txt 2. http://www.securityfocus.com/bid/94882 3. http://www.securitytracker.com/id/1037475