Description
The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.
Remediation
References
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0278.html
http://secunia.com/advisories/39567
http://www.osvdb.org/64020
http://www.securityfocus.com/archive/1/510896/100/0/threaded
http://www.securityfocus.com/bid/39636
http://www.vupen.com/english/advisories/2010/0979
https://issues.apache.org/activemq/browse/AMQ-2700
Related Vulnerabilities
CVE-2019-10316 Vulnerability in maven package org.jenkins-ci.plugins:aqua-microscanner
CVE-2015-5254 Vulnerability in maven package org.apache.activemq:activemq-client
CVE-2022-36906 Vulnerability in maven package org.jenkins-ci.plugins:openshift-deployer
CVE-2018-1257 Vulnerability in maven package org.springframework:spring-messaging
CVE-2013-7315 Vulnerability in maven package org.springframework:spring-web