Lucene search

K
zdiSteven Seeley of Source InciteZDI-15-407
HistoryAug 31, 2015 - 12:00 a.m.

Apache ActiveMQ RestFilter Directory Traversal Remote Code Execution Vulnerability

2015-08-3100:00:00
Steven Seeley of Source Incite
www.zerodayinitiative.com
45

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.033 Low

EPSS

Percentile

91.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apache ActiveMQ. Authentication is not required to exploit this vulnerability. The specific flaw exists within ActiveMQ fileserver web application. By issuing specially crafted requests, an attacker can create an arbitrary file on the server with attacker controlled data. An attacker can leverage this vulnerability to execute code under the context of the user.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.033 Low

EPSS

Percentile

91.3%