Vulnerability Details : CVE-2018-8006
An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2018-8006
- cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
Threat overview for CVE-2018-8006
Top countries where our scanners detected CVE-2018-8006
Top open port discovered on systems with this issue
80
IPs affected by CVE-2018-8006 363
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2018-8006!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2018-8006
36.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-8006
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2018-8006
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-8006
-
https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E
[activemq-website] branch master updated: Publish CVE-2020-1941 security advisory - Pony MailMailing List;Patch;Vendor Advisory
-
http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt
Vendor Advisory
-
http://www.securityfocus.com/bid/105156
Apache ActiveMQ 'QueueFilter' Parameter Cross Site Scripting VulnerabilityThird Party Advisory;VDB Entry
-
https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E
[GitHub] [activemq-website] clebertsuconic commented on a change in pull request #17: Fix the ordering in the security advisories page - Pony MailMailing List;Patch;Vendor Advisory
-
https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E
Re: Website - Pony MailIssue Tracking;Mailing List;Vendor Advisory
-
https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E
Pony Mail!Mailing List;Vendor Advisory
-
https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E
[activemq-website] branch master updated: Publish CVE-2020-13947 - Pony MailMailing List;Patch;Vendor Advisory
-
https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E
[GitHub] [activemq-website] coheigea commented on a change in pull request #17: Fix the ordering in the security advisories page - Pony MailMailing List;Patch;Vendor Advisory
-
https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E
[CONF] Apache ActiveMQ > Security Advisories - Pony MailMailing List;Vendor Advisory
-
https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E
Re: Website - Pony MailIssue Tracking;Vendor Advisory
Jump to