This is an automated email from the ASF dual-hosted git repository.

jbertram pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/main by this push:
     new 63d2f636f NO-JIRA update for CVE-2022-35278
63d2f636f is described below

commit 63d2f636f88bb0cd6351bd13d42140f330e20c6b
Author: Justin Bertram <[email protected]>
AuthorDate: Wed Aug 17 15:47:35 2022 -0500

    NO-JIRA update for CVE-2022-35278
---
 .../CVE-2022-23913-announcement.txt                       | 15 ++++++++-------
 1 file changed, 8 insertions(+), 7 deletions(-)

diff --git a/src/security-advisories.data/CVE-2022-23913-announcement.txt 
b/src/security-advisories.data/CVE-2022-23913-announcement.txt
index 9ef157698..ce1610f91 100644
--- a/src/security-advisories.data/CVE-2022-23913-announcement.txt
+++ b/src/security-advisories.data/CVE-2022-23913-announcement.txt
@@ -1,19 +1,20 @@
-Apache ActiveMQ Artemis DoS (CVE-2022-23913)
+HTML Injection in ActiveMQ Artemis Web Console (CVE-2022-35278)
 PRODUCT AFFECTED:
 This issue affects Apache ActiveMQ Artemis.
 
 PROBLEM:
-In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could 
partially disrupt availability (DoS) through uncontrolled resource consumption 
of memory.
+An attacker could show malicious content and/or redirect users to a malicious 
URL in the web console by using HTML in the name of an address or queue.
 
-This issue has been assigned CVE-2022-23913.
+WORKAROUND:
 
-This issue is being tracked as 
https://issues.apache.org/jira/browse/ARTEMIS-3593.
+Upgrade to Apache ActiveMQ Artemis 2.24.0.
 
-WORKAROUND:
-Upgrade to Apache ActiveMQ Artemis 2.20.0 or 2.19.1 (if you're still using 
Java 8).
+Credit:
+
+Apache ActiveMQ would like to thank Yash Pandya (Digital14), Rajatkumar 
Karmarkar (Digital14), and Likhith Cheekatipalle (Digital14) for reporting this 
issue.
 
 MODIFICATION HISTORY:
 : Initial Publication.
 RELATED LINKS:
-CVE-2022-23913 at cve.mitre.org
+CVE-2022-35278 at cve.mitre.org
 

Reply via email to