rhsa-2016_1424
Vulnerability from csaf_redhat
Published
2016-07-13 19:44
Modified
2024-11-05 19:23
Summary
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.2.1 security and bug fix update
Notes
Topic
Red Hat JBoss Fuse and A-MQ 6.2.1 Rollup Patch 3, which fixes two security issues and includes several bug fixes and various enhancements, is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications.
This patch is an update to Red Hat JBoss Fuse 6.2.1 and Red Hat JBoss A-MQ 6.2.1. It includes several bug fixes, which are documented in the readme.txt file included with the patch files.
Security Fix(es):
* It was reported that the web based administration console does not set the X-Frame-Options header in HTTP responses. This allows the console to be embedded in a frame or iframe which could then be used to cause a user to perform an unintended action in the console. (CVE-2016-0734)
* It was found that Apache Active MQ administration web console did not validate input correctly when creating a queue. An authenticated attacker could exploit this flaw via cross-site scripting and use it to access sensitive information or further attacks. (CVE-2016-0782)
Refer to the readme.txt file included with the patch files for installation instructions.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Fuse and A-MQ 6.2.1 Rollup Patch 3, which fixes two security issues and includes several bug fixes and various enhancements, is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications.\n\nThis patch is an update to Red Hat JBoss Fuse 6.2.1 and Red Hat JBoss A-MQ 6.2.1. It includes several bug fixes, which are documented in the readme.txt file included with the patch files.\n\nSecurity Fix(es):\n\n* It was reported that the web based administration console does not set the X-Frame-Options header in HTTP responses. This allows the console to be embedded in a frame or iframe which could then be used to cause a user to perform an unintended action in the console. (CVE-2016-0734)\n\n* It was found that Apache Active MQ administration web console did not validate input correctly when creating a queue. An authenticated attacker could exploit this flaw via cross-site scripting and use it to access sensitive information or further attacks. (CVE-2016-0782)\n\nRefer to the readme.txt file included with the patch files for installation instructions.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1424", "url": "https://access.redhat.com/errata/RHSA-2016:1424" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.2.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.2.1" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq\u0026downloadType=securityPatches\u0026version=6.2.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq\u0026downloadType=securityPatches\u0026version=6.2.1" }, { "category": "external", "summary": "1317516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317516" }, { "category": "external", "summary": "1317520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317520" }, { "category": "external", "summary": "ENTMQ-1665", "url": "https://issues.redhat.com/browse/ENTMQ-1665" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1424.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.2.1 security and bug fix update", "tracking": { "current_release_date": "2024-11-05T19:23:01+00:00", "generator": { "date": "2024-11-05T19:23:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2016:1424", "initial_release_date": "2016-07-13T19:44:16+00:00", "revision_history": [ { "date": "2016-07-13T19:44:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:38:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T19:23:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss A-MQ 6.2", "product": { "name": "Red Hat JBoss A-MQ 6.2", "product_id": "Red Hat JBoss A-MQ 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:6.2" } } }, { "category": "product_name", "name": "Red Hat JBoss Fuse 6.2", "product": { "name": "Red Hat JBoss Fuse 6.2", "product_id": "Red Hat JBoss Fuse 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Naftali Rosenbaum" ], "organization": "Comsec Consulting" } ], "cve": "CVE-2015-5184", "discovery_date": "2015-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1249183" } ], "notes": [ { "category": "description", "text": "It was found that the Hawtio console setting for the Access-Control-Allow-Origin header permits unrestricted sharing (allow all). An attacker could use this flaw to access sensitive information or perform other attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Console: CORS headers set to allow all in Red Hat AMQ", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects only the Red Hat AMQ Product, and does not impact Apache ActiveMQ.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2", "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5184" }, { "category": "external", "summary": "RHBZ#1249183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249183" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5184", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5184" } ], "release_date": "2015-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-13T19:44:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2", "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1424" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Console: CORS headers set to allow all in Red Hat AMQ" }, { "cve": "CVE-2016-0734", "discovery_date": "2016-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1317520" } ], "notes": [ { "category": "description", "text": "It was reported that the web based administration console does not set the X-Frame-Options header in HTTP responses. This allows the console to be embedded in a frame or iframe which could then be used to cause a user to perform an unintended action in the console.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Clickjacking in Web Console", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2", "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0734" }, { "category": "external", "summary": "RHBZ#1317520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317520" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0734", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0734" }, { "category": "external", "summary": "http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt", "url": "http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt" } ], "release_date": "2016-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-13T19:44:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2", "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1424" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss A-MQ 6.2", "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Clickjacking in Web Console" }, { "cve": "CVE-2016-0782", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1317516" } ], "notes": [ { "category": "description", "text": "It was found that Apache Active MQ administration web console did not validate input correctly when creating a queue. An authenticated attacker could exploit this flaw via cross-site scripting and use it to access sensitive information or further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Cross-site scripting vulnerabilities in web console", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2", "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0782" }, { "category": "external", "summary": "RHBZ#1317516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317516" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0782", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0782" }, { "category": "external", "summary": "http://activemq.apache.org/security-advisories.data/CVE-2016-0782-announcement.txt", "url": "http://activemq.apache.org/security-advisories.data/CVE-2016-0782-announcement.txt" } ], "release_date": "2016-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-13T19:44:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2", "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1424" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss A-MQ 6.2", "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Cross-site scripting vulnerabilities in web console" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.