Description
The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.
Remediation
References
http://secunia.com/advisories/39567
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0278.html
http://www.securityfocus.com/bid/39636
http://www.osvdb.org/64020
http://www.vupen.com/english/advisories/2010/0979
https://issues.apache.org/activemq/browse/AMQ-2700
http://www.securityfocus.com/archive/1/510896/100/0/threaded
Related Vulnerabilities
CVE-2023-24815 Vulnerability in maven package io.vertx:vertx-web
CVE-2023-24454 Vulnerability in maven package org.jenkins-ci.plugins:testquality-updater
CVE-2017-2611 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-42795 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2022-29405 Vulnerability in maven package org.apache.archiva:archiva