First published: Mon Feb 08 2021(Updated: )
An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Directory Suite VA | <=8.0.1-8.0.1.19 | |
Apache ActiveMQ | <5.15.14 | |
Apache ActiveMQ | >=5.16.0<5.16.1 | |
Oracle Communications Session Report Manager | >=8.0.0<=8.2.2 | |
Oracle Communications Session Route Manager | >=8.0.0<=8.2.2 | |
maven/org.apache.activemq:activemq-parent | <5.15.14 | 5.15.14 |
maven/org.apache.activemq:activemq-parent | >=5.16.0<5.16.1 | 5.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13947 is a cross-site scripting vulnerability in Apache ActiveMQ.
CVE-2020-13947 allows remote attackers to execute script in a victim's web browser by exploiting improper validation of user-supplied input by the message.jsp script.
Apache ActiveMQ versions up to 5.15.14 and versions 5.16.0 to 5.16.1, Oracle Communications Session Report Manager versions 8.0.0 to 8.2.2, Oracle Communications Session Route Manager versions 8.0.0 to 8.2.2, and IBM Security Directory Suite VA versions up to 8.0.1-8.0.1.19 are affected by CVE-2020-13947.
CVE-2020-13947 has a severity score of 6.1 (Moderate).
To fix CVE-2020-13947, you should update Apache ActiveMQ to version 5.15.15 or above, Oracle Communications Session Report Manager and Oracle Communications Session Route Manager to versions 8.2.3 or above, and IBM Security Directory Suite VA to a version higher than 8.0.1.19.