In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
References
Configurations
History
07 Nov 2023, 03:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-07-20 22:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-13932
Mitre link : CVE-2020-13932
CVE.ORG link : CVE-2020-13932
JSON object : View
Products Affected
apache
- activemq_artemis
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')