First published: Wed Jul 13 2016(Updated: )
Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications.<br>This patch is an update to Red Hat JBoss Fuse 6.2.1 and Red Hat JBoss A-MQ 6.2.1. It includes several bug fixes, which are documented in the readme.txt file included with the patch files.<br>Security Fix(es):<br><li> It was reported that the web based administration console does not set the X-Frame-Options header in HTTP responses. This allows the console to be embedded in a frame or iframe which could then be used to cause a user to perform an unintended action in the console. (CVE-2016-0734)</li> <li> It was found that Apache Active MQ administration web console did not validate input correctly when creating a queue. An authenticated attacker could exploit this flaw via cross-site scripting and use it to access sensitive information or further attacks. (CVE-2016-0782)</li> Refer to the readme.txt file included with the patch files for installation instructions.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fuse | ||
Red Hat JBoss Fuse/A-MQ 6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2016:1424 is classified as moderate.
To fix RHSA-2016:1424, apply the recommended security update for Red Hat JBoss Fuse and Red Hat JBoss A-MQ.
RHSA-2016:1424 affects Red Hat JBoss Fuse and Red Hat JBoss A-MQ.
No specific workaround has been provided for the vulnerabilities addressed in RHSA-2016:1424 aside from applying updates.
RHSA-2016:1424 was released on November 2, 2016.