aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authortj <tj@FreeBSD.org>2016-03-26 01:04:02 +0800
committertj <tj@FreeBSD.org>2016-03-26 01:04:02 +0800
commit3348bc364ae103b845078b0568ef26dcfdbf54ca (patch)
tree48ae7ef5dc5b1f1bf926d249545152b103cd43f0 /security
parent2bdeb5d8e1952646295c48958a73549da86b3242 (diff)
downloadfreebsd-ports-gnome-3348bc364ae103b845078b0568ef26dcfdbf54ca.tar.gz
freebsd-ports-gnome-3348bc364ae103b845078b0568ef26dcfdbf54ca.tar.zst
freebsd-ports-gnome-3348bc364ae103b845078b0568ef26dcfdbf54ca.zip
Document multipule activemq vulnerabilities:
CVE-2016-0782 - ActiveMQ Web Console - Cross-Site Scripting CVE-2016-0734 - ActiveMQ Web Console - Clickjacking CVE-2015-5254 - Unsafe deserialization in ActiveMQ PR: 208163 PR: 208193 Security: CVE-2015-5254 Security: http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt Security: CVE-2016-0782 Security: http://activemq.apache.org/security-advisories.data/CVE-2016-0782-announcement.txt Security: CVE-2016-0734 Security: http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml92
1 files changed, 92 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 377e482bc293..61ab72aefd3e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,98 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a258604d-f2aa-11e5-b4a9-ac220bdcec59">
+ <topic>activemq -- Unsafe deserialization</topic>
+ <affects>
+ <package>
+ <name>activemq</name>
+ <range><lt>5.13.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Alvaro Muatoz, Matthias Kaiser and Christian Schneider reports:</p>
+ <blockquote cite="http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt">
+ <p>JMS Object messages depends on Java Serialization for
+ marshaling/unmashaling of the message payload. There are a couple of places
+ inside the broker where deserialization can occur, like web console or stomp
+ object message transformation. As deserialization of untrusted data can leaed to
+ security flaws as demonstrated in various reports, this leaves the broker
+ vunerable to this attack vector. Additionally, applications that consume
+ ObjectMessage type of messages can be vunerable as they deserlize objects on
+ ObjectMessage.getObject() calls.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt</url>
+ <cvename>CVE-2015-5254</cvename>
+ </references>
+ <dates>
+ <discovery>2016-01-08</discovery>
+ <entry>2016-03-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="950b2d60-f2a9-11e5-b4a9-ac220bdcec59">
+ <topic>activemq -- Web Console Clickjacking</topic>
+ <affects>
+ <package>
+ <name>activemq</name>
+ <range><lt>5.13.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Michael Furman reports:</p>
+ <blockquote cite="http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt">
+ <p>The web based administration console does not set the
+ X-Frame-Options header in HTTP responses. This allows the console to be embedded
+ in a frame or iframe which could then be used to cause a user to perform an
+ unintended action in the console.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt</url>
+ <cvename>CVE-2016-0734</cvename>
+ </references>
+ <dates>
+ <discovery>2016-03-10</discovery>
+ <entry>2016-03-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a6cc5753-f29e-11e5-b4a9-ac220bdcec59">
+ <topic>activemq -- Web Console Cross-Site Scripting</topic>
+ <affects>
+ <package>
+ <name>activemq</name>
+ <range><lt>5.13.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Vladimir Ivanov (Positive Technologies) reports:</p>
+ <blockquote cite="http://activemq.apache.org/security-advisories.data/CVE-2016-0782-announcement.txt">
+ <p>Several instances of cross-site scripting vulnerabilities were
+ identified to be present in the web based administration console as well as the
+ ability to trigger a Java memory dump into an arbitrary folder. The root cause
+ of these issues are improper user data output validation and incorrect
+ permissions configured on Jolokia.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://activemq.apache.org/security-advisories.data/CVE-2016-0782-announcement.txt</url>
+ <cvename>CVE-2016-0782</cvename>
+ </references>
+ <dates>
+ <discovery>2016-03-10</discovery>
+ <entry>2016-03-25</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7033b42d-ef09-11e5-b766-14dae9d210b8">
<topic>pcre -- stack buffer overflow</topic>
<affects>