Description
The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests.
Remediation
References
http://activemq.apache.org/activemq-580-release.html
https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12311210&version=12323282
http://activemq.2283324.n4.nabble.com/DISCUSS-ActiveMQ-out-of-the-box-Should-not-include-the-demos-tc4658044.html
https://issues.apache.org/jira/browse/AMQ-4124
https://fisheye6.atlassian.com/changelog/activemq?cs=1404998
http://rhn.redhat.com/errata/RHSA-2013-1221.html
http://rhn.redhat.com/errata/RHSA-2013-1029.html
http://www.securityfocus.com/bid/59402
Related Vulnerabilities
CVE-2022-39263 Vulnerability in npm package @next-auth/upstash-redis-adapter
CVE-2013-2192 Vulnerability in maven package org.apache.hadoop:hadoop-common
CVE-2020-7787 Vulnerability in npm package react-adal
CVE-2023-1784 Vulnerability in maven package org.jeecgframework.boot:jeecg-boot-parent
CVE-2019-12395 Vulnerability in maven package us.dynmap:dynmap