#VU25819 Path traversal in ActiveMQ - CVE-2015-1830
Published: March 8, 2020 / Updated: June 17, 2021
ActiveMQ
Apache Foundation
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the fileserver upload/download functionality for blob messages in Apache ActiveMQ 5.x before 5.11.2 for Windows. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to create JSP files in arbitrary directories via unspecified vectors.
Remediation
External links
- http://activemq.apache.org/security-advisories.data/CVE-2015-1830-announcement.txt
- http://www.securityfocus.com/bid/76452
- http://www.securitytracker.com/id/1033315
- http://www.zerodayinitiative.com/advisories/ZDI-15-407
- http://www.zerodayinitiative.com/advisories/ZDI-15-407/
- https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E