CVE-2010-1244
Published Apr 5, 2010
Last updated 7 years ago
Overview
- Description
- Cross-site request forgery (CSRF) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote attackers to hijack the authentication of unspecified victims for requests that create queues via the JMSDestination parameter in a queue action.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85959DE7-33A4-4A11-B6D8-E65296A815A3", "versionEndIncluding": "5.3.0" }, { "criteria": "cpe:2.3:a:apache:activemq:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BE01D34-3143-4B35-A147-D390C11A66A7" }, { "criteria": "cpe:2.3:a:apache:activemq:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B189348D-6BDC-4D81-A8F5-A5CB5C04A919" }, { "criteria": "cpe:2.3:a:apache:activemq:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF2B404D-6403-403F-9693-22F3F0B99C1A" }, { "criteria": "cpe:2.3:a:apache:activemq:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F34843D9-B15E-4404-9A90-DB4BE5F94F0B" }, { "criteria": "cpe:2.3:a:apache:activemq:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE82B9EF-F072-4280-AEB4-6F36F9A1220F" }, { "criteria": "cpe:2.3:a:apache:activemq:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C73DC09-DF82-4788-A65D-A1D6FA9981BA" }, { "criteria": "cpe:2.3:a:apache:activemq:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DFF4ED9-3619-4231-99BD-C7D5FCD05FA4" }, { "criteria": "cpe:2.3:a:apache:activemq:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C1744C6-3C5F-4DF0-9E31-C58A5D723B61" }, { "criteria": "cpe:2.3:a:apache:activemq:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05EC35BF-C4D1-47FB-8CAD-6AD1D4D0FCC4" }, { "criteria": "cpe:2.3:a:apache:activemq:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76BBC469-8849-458C-927E-1F83A2194F93" }, { "criteria": "cpe:2.3:a:apache:activemq:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BFBE4C3-2F7C-40CF-95A6-53AB10B26ABF" }, { "criteria": "cpe:2.3:a:apache:activemq:3.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BE6691D-1666-4C30-BE51-6036305717B6" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA1D17FC-EE96-4E59-A655-541DD4C01822" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0:m4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5CCD470-62EA-4E53-80BA-D92E74298577" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01145606-6FD6-482F-9F76-4D9C7E452E2F" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B741D677-63F9-4B31-8E68-3084815F9BF6" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF5D8AFE-B431-482E-892E-C038A96D5FEA" }, { "criteria": "cpe:2.3:a:apache:activemq:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCC189C2-95A8-4CA0-8FEF-39857F079425" }, { "criteria": "cpe:2.3:a:apache:activemq:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B850F6F-0605-411F-9A98-4B8147DEAD3A" }, { "criteria": "cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "436F59B9-507A-4B4E-A9F3-022616866151" }, { "criteria": "cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F58D9E69-CBF2-4FB6-B062-ED21F83CBCCB" }, { "criteria": "cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05D6EC30-88DC-4424-BF86-D9C0DA5E191C" } ], "operator": "OR" } ] } ]