Miggo Logo

CVE-2016-0782: Improper Neutralization of Input During Web Page Generation in Apache ActiveMQ

5.4

CVSS Score
3.0

Basic Information

EPSS Score
0.80706%
Published
5/14/2022
Updated
3/14/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.activemq:activemq-clientmaven>= 5.0.0, <= 5.11.35.11.4
org.apache.activemq:activemq-clientmaven>= 5.12.0, <= 5.12.25.12.3
org.apache.activemq:activemq-clientmaven>= 5.13.0, <= 5.13.15.13.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key issues:

  1. XSS in queue handling: The admin console's JSP files failed to properly sanitize user-controlled queue names before rendering them in HTML, as evidenced by the CWE-79 classification and attack vector description.
  2. Jolokia misconfiguration: The web.xml configuration for Jolokia (AgentServlet) initially allowed error details and discovery, which combined with XSS could lead to memory dump retrieval. This is confirmed by the patching commits (0c9fdb5, 2061186) that disabled these features and upgraded Jolokia.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** **ministr*tion w** *onsol* in *p**** **tiv*MQ *.x ***or* *.**.*, *.**.x ***or* *.**.*, *n* *.**.x ***or* *.**.* *llows r*mot* *ut**nti**t** us*rs to *on*u*t *ross-sit* s*riptin* (XSS) *tt**ks *n* *ons*qu*ntly o*t*in s*nsitiv* in*orm*tion *rom * J

Reasoning

T** vuln*r**ility st*ms *rom two k*y issu*s: *. XSS in qu*u* **n*lin*: T** **min *onsol*'s JSP *il*s **il** to prop*rly s*nitiz* us*r-*ontroll** qu*u* n*m*s ***or* r*n**rin* t**m in *TML, *s *vi**n*** *y t** *W*-** *l*ssi*i**tion *n* *tt**k v**tor **