This is an automated email from the ASF dual-hosted git repository.

jbertram pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/main by this push:
     new fa62ca516 NO-JIRA update for CVE-2022-35278
fa62ca516 is described below

commit fa62ca5161ac34792e0f5789513bbad5afe74709
Author: Justin Bertram <[email protected]>
AuthorDate: Wed Aug 17 15:49:13 2022 -0500

    NO-JIRA update for CVE-2022-35278
---
 .../CVE-2022-35278-announcement.txt                   | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)

diff --git a/src/security-advisories.data/CVE-2022-35278-announcement.txt 
b/src/security-advisories.data/CVE-2022-35278-announcement.txt
new file mode 100644
index 000000000..1b0aa8bac
--- /dev/null
+++ b/src/security-advisories.data/CVE-2022-35278-announcement.txt
@@ -0,0 +1,19 @@
+HTML Injection in ActiveMQ Artemis Web Console (CVE-2022-35278)
+PRODUCT AFFECTED:
+This issue affects Apache ActiveMQ Artemis.
+
+PROBLEM:
+An attacker could show malicious content and/or redirect users to a malicious 
URL in the web console by using HTML in the name of an address or queue.
+
+WORKAROUND:
+
+Upgrade to Apache ActiveMQ Artemis 2.24.0.
+
+Credit:
+
+Apache ActiveMQ would like to thank Yash Pandya (Digital14), Rajatkumar 
Karmarkar (Digital14), and Likhith Cheekatipalle (Digital14) for reporting this 
issue.
+
+MODIFICATION HISTORY:
+: Initial Publication.
+RELATED LINKS:
+CVE-2022-35278 at cve.mitre.org

Reply via email to