Description
The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.
Remediation
References
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0278.html
http://secunia.com/advisories/39567
http://www.osvdb.org/64020
http://www.securityfocus.com/archive/1/510896/100/0/threaded
http://www.securityfocus.com/bid/39636
http://www.vupen.com/english/advisories/2010/0979
https://issues.apache.org/activemq/browse/AMQ-2700
Related Vulnerabilities
CVE-2023-46119 Vulnerability in npm package parse-server
CVE-2023-39154 Vulnerability in maven package com.qualys.plugins:qualys-was
CVE-2018-1334 Vulnerability in maven package org.apache.spark:spark-core
CVE-2022-2237 Vulnerability in npm package keycloak-connect
CVE-2018-6874 Vulnerability in maven package org.webjars.npm:auth0-js