You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@activemq.apache.org by "veerendra (JIRA)" <ji...@apache.org> on 2010/04/20 13:30:14 UTC
[jira] Updated: (AMQ-2700) Apache ActiveMQ is prone to source code
disclosure vulnerability.
[ https://issues.apache.org/activemq/browse/AMQ-2700?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
veerendra updated AMQ-2700:
---------------------------
Attachment: SECPOD_ActiveMQ.txt
Attached file is having complete information about the issue.
> Apache ActiveMQ is prone to source code disclosure vulnerability.
> -----------------------------------------------------------------
>
> Key: AMQ-2700
> URL: https://issues.apache.org/activemq/browse/AMQ-2700
> Project: ActiveMQ
> Issue Type: Bug
> Affects Versions: 5.3.1
> Environment: Linux/Windows environment
> Reporter: veerendra
> Attachments: SECPOD_ActiveMQ.txt
>
>
> An input validation error is present in Apache ActiveMQ. Adding '//' after the
> port in an URL causes it to disclose the JSP page source.
> This has been tested on various admin pages,
> admin/index.jsp, admin/queues.jsp, admin/topics.jsp etc.
> NOTE : Refer attached file for complete information/advisory.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.