Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2016-0734
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
The web-based administration console in Apache ActiveMQ 5.x before 5.13.2 does not send an X-Frame-Options HTTP header, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web page that contains a (1) FRAME or (2) IFRAME element..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 6.1/10
- Exploit Score
- 2.8/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- None
- Impact Score
- 2.7/10
- Confidentiality Impact
- Low
- Availability Impact
- None
- Integrity Impact
- Low
- Scope
- Changed
- User Interaction
- Required
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.11.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.8.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.12.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.13.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.9.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.11.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.11.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.12.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.10.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.10.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.10.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.9.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.12.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.openwall.com/lists/oss-security/2016/03/10/11
- http://activemq.apache.org/security-advisories.data/CVE-2016-0734-announcement.txt
- https://access.redhat.com/errata/RHSA-2016:1424
- http://www.securitytracker.com/id/1035327
- http://www.securityfocus.com/bid/84321
- https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62ae