This is an automated email from the ASF dual-hosted git repository.

gtully pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/master by this push:
     new 40b546e  add new announcement
40b546e is described below

commit 40b546e68b9a647548b47e1b8618f29bc4b4ee9a
Author: gtully <[email protected]>
AuthorDate: Mon Jul 20 17:12:38 2020 +0100

    add new announcement
---
 content/components/artemis/security.html              |  1 +
 .../CVE-2020-13932-announcement.txt                   | 19 +++++++++++++++++++
 src/components/artemis/security.md                    |  1 +
 .../CVE-2020-13932-announcement.txt                   | 19 +++++++++++++++++++
 4 files changed, 40 insertions(+)

diff --git a/content/components/artemis/security.html 
b/content/components/artemis/security.html
index 07be4e2..e1659a6 100644
--- a/content/components/artemis/security.html
+++ b/content/components/artemis/security.html
@@ -97,6 +97,7 @@
 <p>See the main <a href="../../security-advisories">Security Advisories</a> 
page for details for other components and general information such as reporting 
new security issues.</p>
 
 <ul>
+  <li><a 
href="../../security-advisories.data/CVE-2020-13932-announcement.txt">CVE-2020-13932</a>
 - Apache ActiveMQ Artemis - Remote XSS in Web console Diagram Plugin</li>
   <li><a 
href="../../security-advisories.data/CVE-2017-12174-announcement.txt">CVE-2017-12174</a>
 - Memory exhaustion via UDP and JGroups discovery</li>
   <li><a 
href="../../security-advisories.data/CVE-2016-4978-announcement.txt">CVE-2016-4978</a>
 - Apache ActiveMQ Artemis: Deserialization of untrusted input vunerability</li>
 </ul>
diff --git a/content/security-advisories.data/CVE-2020-13932-announcement.txt 
b/content/security-advisories.data/CVE-2020-13932-announcement.txt
new file mode 100644
index 0000000..176a20d
--- /dev/null
+++ b/content/security-advisories.data/CVE-2020-13932-announcement.txt
@@ -0,0 +1,19 @@
+CVE-2020-13932: Apache ActiveMQ Artemis - Remote XSS in Web console Diagram 
Plugin
+
+Severity: Medium
+
+Vendor: The Apache Software Foundation
+
+Affected Version: Apache ActiveMQ Artemis 2.5.0 to 2.13.0
+
+Vulnerability details:
+A specifically crafted MQTT packet which has an XSS payload as
+client-id or topic name can exploit this vulnerability. The XSS
+payload is being injected into the admin console's browser. The XSS
+payload is triggered in the diagram plugin; queue node and the info
+section.
+
+Mitigation:
+Upgrade to Apache ActiveMQ Artemis 2.14.0
+
+Credit: This issue was discovered by Arun Magesh from Payatu Software Labs
diff --git a/src/components/artemis/security.md 
b/src/components/artemis/security.md
index b315e8c..ed8b8f8 100644
--- a/src/components/artemis/security.md
+++ b/src/components/artemis/security.md
@@ -9,5 +9,6 @@ Details of security problems fixed in released versions of 
Apache ActiveMQ Artem
 
 See the main [Security Advisories](../../security-advisories) page for details 
for other components and general information such as reporting new security 
issues.
 
+*   
[CVE-2020-13932](../../security-advisories.data/CVE-2020-13932-announcement.txt)
 - Apache ActiveMQ Artemis - Remote XSS in Web console Diagram Plugin 
 *   
[CVE-2017-12174](../../security-advisories.data/CVE-2017-12174-announcement.txt)
 - Memory exhaustion via UDP and JGroups discovery
 *   
[CVE-2016-4978](../../security-advisories.data/CVE-2016-4978-announcement.txt) 
- Apache ActiveMQ Artemis: Deserialization of untrusted input vunerability
diff --git a/src/security-advisories.data/CVE-2020-13932-announcement.txt 
b/src/security-advisories.data/CVE-2020-13932-announcement.txt
new file mode 100644
index 0000000..176a20d
--- /dev/null
+++ b/src/security-advisories.data/CVE-2020-13932-announcement.txt
@@ -0,0 +1,19 @@
+CVE-2020-13932: Apache ActiveMQ Artemis - Remote XSS in Web console Diagram 
Plugin
+
+Severity: Medium
+
+Vendor: The Apache Software Foundation
+
+Affected Version: Apache ActiveMQ Artemis 2.5.0 to 2.13.0
+
+Vulnerability details:
+A specifically crafted MQTT packet which has an XSS payload as
+client-id or topic name can exploit this vulnerability. The XSS
+payload is being injected into the admin console's browser. The XSS
+payload is triggered in the diagram plugin; queue node and the info
+section.
+
+Mitigation:
+Upgrade to Apache ActiveMQ Artemis 2.14.0
+
+Credit: This issue was discovered by Arun Magesh from Payatu Software Labs

Reply via email to