Miggo Logo

CVE-2010-1587:
Apache ActiveMQ Sensitive Information Disclosure via the Jetty ResourceHandler

5

CVSS Score

Basic Information

EPSS Score
0.98582%
Published
5/14/2022
Updated
3/15/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.activemq:activemq-web-consolemaven>= 5.0.0, < 5.3.25.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Jetty's ResourceHandler configuration in jetty.xml where resourceBase was set to 'webapps/' directory. This allowed attackers to bypass security controls using '//' in URIs to access JSP source files. The patch moved resourceBase to 'webapps/static/', isolating static resources from sensitive JSP files. The configuration change directly addresses the path traversal issue, confirming this as the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** J*tty R*sour****n*l*r in *p**** **tiv*MQ *.x ***or* *.*.* *n* *.*.x ***or* *.*.* *llows r*mot* *tt**k*rs to r*** JSP sour** *o** vi* * // (sl*s* sl*s*) initi*l su*strin* in * URI *or (*) **min/in**x.jsp, (*) **min/qu*u*s.jsp, or (*) **min/topi*s.

Reasoning

T** vuln*r**ility st*ms *rom J*tty's R*sour****n*l*r *on*i*ur*tion in `j*tty.xml` w**r* `r*sour****s*` w*s s*t to 'w***pps/' *ir**tory. T*is *llow** *tt**k*rs to *yp*ss s**urity *ontrols usin* '//' in URIs to ****ss JSP sour** *il*s. T** p*t** mov**