CVE-2012-6092
Published Apr 21, 2013
Last updated a year ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA0C6D29-FFCF-4D59-A2D3-2C226F3F679A", "versionEndIncluding": "5.7.0" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA1D17FC-EE96-4E59-A655-541DD4C01822" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0:m4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5CCD470-62EA-4E53-80BA-D92E74298577" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01145606-6FD6-482F-9F76-4D9C7E452E2F" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B741D677-63F9-4B31-8E68-3084815F9BF6" }, { "criteria": "cpe:2.3:a:apache:activemq:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF5D8AFE-B431-482E-892E-C038A96D5FEA" }, { "criteria": "cpe:2.3:a:apache:activemq:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCC189C2-95A8-4CA0-8FEF-39857F079425" }, { "criteria": "cpe:2.3:a:apache:activemq:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B850F6F-0605-411F-9A98-4B8147DEAD3A" }, { "criteria": "cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "436F59B9-507A-4B4E-A9F3-022616866151" }, { "criteria": "cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F58D9E69-CBF2-4FB6-B062-ED21F83CBCCB" }, { "criteria": "cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05D6EC30-88DC-4424-BF86-D9C0DA5E191C" }, { "criteria": "cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82ACD6BA-257F-49D0-8944-0991FB038533" }, { "criteria": "cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C43FD7A1-FC03-47BC-B6C6-02C0F1466762" }, { "criteria": "cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7A8D571-2925-4F61-B3F0-8F4A3776F6EA" }, { "criteria": "cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47B31CD9-A3BB-427C-A631-2E8168DD1985" }, { "criteria": "cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B904806-6796-4947-BDF4-EEA5681147E8" }, { "criteria": "cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61B4A1EE-7F62-4602-A102-8AD8E9FD528F" }, { "criteria": "cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "623530FC-12E9-480B-AFA0-C19FCFFA5D36" }, { "criteria": "cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5755A41-0DBE-4F54-A1C1-4F65DCC6ACD2" }, { "criteria": "cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11AADFBF-AC60-4535-892C-BE90BE858172" } ], "operator": "OR" } ] } ]