The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.
References
Configurations
History
21 Nov 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2036.html - Third Party Advisory | |
References | () http://www.securitytracker.com/id/1035951 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-16-356 - Third Party Advisory, VDB Entry | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-16-357 - Third Party Advisory, VDB Entry | |
References | () https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - Mailing List, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/42283/ - Exploit, Third Party Advisory, VDB Entry |
24 Jul 2024, 16:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2036.html - Third Party Advisory | |
References | () http://www.securitytracker.com/id/1035951 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-16-356 - Third Party Advisory, VDB Entry | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-16-357 - Third Party Advisory, VDB Entry | |
References | () https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - Mailing List, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/42283/ - Exploit, Third Party Advisory, VDB Entry | |
CWE | CWE-434 |
07 Nov 2023, 02:32
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-06-01 20:59
Updated : 2024-11-21 02:49
NVD link : CVE-2016-3088
Mitre link : CVE-2016-3088
CVE.ORG link : CVE-2016-3088
JSON object : View
Products Affected
apache
- activemq
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type