Описание
The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.
Ссылки
- Vendor Advisory
- Exploit
- Vendor Advisory
- Patch
- Vendor Advisory
- Exploit
- Vendor Advisory
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq:5.4-snapshot:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.75383
Высокий
5 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
redhat
почти 16 лет назад
The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.
github
больше 3 лет назад
Apache ActiveMQ Sensitive Information Disclosure via the Jetty ResourceHandler
EPSS
Процентиль: 99%
0.75383
Высокий
5 Medium
CVSS2
Дефекты
CWE-20