CVE-2016-3088

The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.
References
Link Resource
http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2016-2036.html Third Party Advisory
http://www.securitytracker.com/id/1035951 Broken Link Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-16-356 Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-16-357 Third Party Advisory VDB Entry
https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E Issue Tracking Mailing List
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E Mailing List Vendor Advisory
https://www.exploit-db.com/exploits/42283/ Exploit Third Party Advisory VDB Entry
http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2016-2036.html Third Party Advisory
http://www.securitytracker.com/id/1035951 Broken Link Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-16-356 Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-16-357 Third Party Advisory VDB Entry
https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E Issue Tracking Mailing List
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E Mailing List Vendor Advisory
https://www.exploit-db.com/exploits/42283/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:49

Type Values Removed Values Added
References () http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - Vendor Advisory () http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2036.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2036.html - Third Party Advisory
References () http://www.securitytracker.com/id/1035951 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1035951 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.zerodayinitiative.com/advisories/ZDI-16-356 - Third Party Advisory, VDB Entry () http://www.zerodayinitiative.com/advisories/ZDI-16-356 - Third Party Advisory, VDB Entry
References () http://www.zerodayinitiative.com/advisories/ZDI-16-357 - Third Party Advisory, VDB Entry () http://www.zerodayinitiative.com/advisories/ZDI-16-357 - Third Party Advisory, VDB Entry
References () https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E - Mailing List, Patch () https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E - Mailing List, Patch
References () https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E - Issue Tracking, Mailing List () https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E - Issue Tracking, Mailing List
References () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - Mailing List, Vendor Advisory () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - Mailing List, Vendor Advisory
References () https://www.exploit-db.com/exploits/42283/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42283/ - Exploit, Third Party Advisory, VDB Entry

24 Jul 2024, 16:04

Type Values Removed Values Added
References () http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - () http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2036.html - () http://rhn.redhat.com/errata/RHSA-2016-2036.html - Third Party Advisory
References () http://www.securitytracker.com/id/1035951 - () http://www.securitytracker.com/id/1035951 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.zerodayinitiative.com/advisories/ZDI-16-356 - () http://www.zerodayinitiative.com/advisories/ZDI-16-356 - Third Party Advisory, VDB Entry
References () http://www.zerodayinitiative.com/advisories/ZDI-16-357 - () http://www.zerodayinitiative.com/advisories/ZDI-16-357 - Third Party Advisory, VDB Entry
References () https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E - () https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E - Mailing List, Patch
References () https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E - () https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E - Issue Tracking, Mailing List
References () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - Mailing List, Vendor Advisory
References () https://www.exploit-db.com/exploits/42283/ - () https://www.exploit-db.com/exploits/42283/ - Exploit, Third Party Advisory, VDB Entry
CWE CWE-20 CWE-434

07 Nov 2023, 02:32

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E', 'name': '[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'name': '[announce] 20200131 Apache Software Foundation Security Report: 2019', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a@%3Cusers.activemq.apache.org%3E', 'name': '[activemq-users] 20190703 Re: ActiveMQ cve vulnerabilities seen in latest version', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E -
  • () https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E -
  • () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E -

Information

Published : 2016-06-01 20:59

Updated : 2024-11-21 02:49


NVD link : CVE-2016-3088

Mitre link : CVE-2016-3088

CVE.ORG link : CVE-2016-3088


JSON object : View

Products Affected

apache

  • activemq
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type