This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 8a73e538f Automatic Site Publish by Buildbot
8a73e538f is described below

commit 8a73e538f292888a740ea2d2c9cc8c479c4ca4e2
Author: buildbot <[email protected]>
AuthorDate: Wed Aug 17 20:51:40 2022 +0000

    Automatic Site Publish by Buildbot
---
 .../CVE-2022-35278-announcement.txt                   | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)

diff --git a/output/security-advisories.data/CVE-2022-35278-announcement.txt 
b/output/security-advisories.data/CVE-2022-35278-announcement.txt
new file mode 100644
index 000000000..1b0aa8bac
--- /dev/null
+++ b/output/security-advisories.data/CVE-2022-35278-announcement.txt
@@ -0,0 +1,19 @@
+HTML Injection in ActiveMQ Artemis Web Console (CVE-2022-35278)
+PRODUCT AFFECTED:
+This issue affects Apache ActiveMQ Artemis.
+
+PROBLEM:
+An attacker could show malicious content and/or redirect users to a malicious 
URL in the web console by using HTML in the name of an address or queue.
+
+WORKAROUND:
+
+Upgrade to Apache ActiveMQ Artemis 2.24.0.
+
+Credit:
+
+Apache ActiveMQ would like to thank Yash Pandya (Digital14), Rajatkumar 
Karmarkar (Digital14), and Likhith Cheekatipalle (Digital14) for reporting this 
issue.
+
+MODIFICATION HISTORY:
+: Initial Publication.
+RELATED LINKS:
+CVE-2022-35278 at cve.mitre.org

Reply via email to