CVE-2014-3579

Impact:
Moderate
Public Date:
2015-02-05
CWE:
CWE-611
Bugzilla:
1135872: CVE-2014-3579 Apache ActiveMQ Apollo: XXE via XPath expression evaluation
It was discovered that Apache ActiveMQ Apollo performed XML External Entity (XXE) expansion when evaluating XPath expressions. A remote, attacker-controlled consumer able to specify an XPath-based selector to dequeue XML messages from an Apache ActiveMQ Apollo broker could use this flaw to read files accessible to the user running the broker, and potentially perform other more advanced XXE attacks.

Find out more about CVE-2014-3579 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Not vulnerable. Apache ActiveMQ Apollo is not shipped with any supported Red Hat product.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat OpenShift Enterprise 2 acrivemq Not affected
Red Hat OpenShift Enterprise 1 activemq Not affected

Acknowledgements

Red Hat would like to thank Georgi Geshev of MWR Labs for reporting this issue.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.