Lucene search

K
nessusThis script is Copyright (C) 2017-2023 and is owned by Tenable, Inc. or an Affiliate thereof.ACTIVEMQ_5_14_5.NASL
HistoryApr 25, 2017 - 12:00 a.m.

Apache ActiveMQ 5.x < 5.14.5 ControlCommand DoS

2017-04-2500:00:00
This script is Copyright (C) 2017-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
38

4.1 Medium

AI Score

Confidence

High

The version of Apache ActiveMQ running on the remote host is 5.x prior to 5.14.5. It is, therefore, affected by an unspecified flaw in ControlCommand handling by the ActiveMQConnection::onControlCommand() function within file ActiveMQConnection.java. An unauthenticated, remote attacker can exploit this to cause a denial of service condition.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(99664);
  script_version("1.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/08");

  script_cve_id("CVE-2015-7559");
  script_bugtraq_id(97967);

  script_name(english:"Apache ActiveMQ 5.x < 5.14.5 ControlCommand DoS");

  script_set_attribute(attribute:"synopsis", value:
"A web application running on the remote host is affected by a denial
of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Apache ActiveMQ running on the remote host is 5.x prior
to 5.14.5. It is, therefore, affected by an unspecified flaw in
ControlCommand handling by the ActiveMQConnection::onControlCommand()
function within file ActiveMQConnection.java. An unauthenticated,
remote attacker can exploit this to cause a denial of service
condition.");
  script_set_attribute(attribute:"see_also", value:"http://activemq.apache.org/activemq-5145-release.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Apache ActiveMQ version 5.14.5 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:ND");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:X");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-7559");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/10/18");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/04/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/04/25");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:activemq");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_set_attribute(attribute:"agent", value:"unix");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2017-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("activemq_web_console_detect.nasl","apache_activemq_nix_installed.nbin","activemq_listen_port_detect.nbin"); 
  script_require_keys("installed_sw/ActiveMQ");

  exit(0);
}

include("vcf.inc");

var app = vcf::combined_get_app_info(app:'ActiveMQ');

var constraints = [
  { "min_version" : "5.0.0", "max_version" : "5.14.4", "fixed_version" : "5.14.5" }
];

vcf::check_version_and_report(app_info:app, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
apacheactivemqcpe:/a:apache:activemq