First published: Mon Jul 20 2020(Updated: )
A flaw was found in activemq. A specifically crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Apache ActiveMQ Artemis | <2.14.0 | 2.14.0 |
Apache ActiveMQ Artemis | >=2.5.0<=2.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13932 is a vulnerability found in Apache ActiveMQ Artemis. A specially crafted MQTT packet with an XSS payload can exploit this vulnerability.
The severity of CVE-2020-13932 is medium, with a CVSS severity score of 6.5.
CVE-2020-13932 can be exploited by sending a specially crafted MQTT packet with an XSS payload as the client-id or topic name.
To fix CVE-2020-13932, update Apache ActiveMQ Artemis to version 2.14.0.
The Common Vulnerabilities and Exposures (CVE) identifier for this vulnerability is CVE-2020-13932.