[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-22 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17114542#comment-17114542
 ] 

ASF subversion and git services commented on AMQ-7465:
--

Commit 9ac781592558cc69ce070b84ff268c48b5ef7981 in activemq's branch 
refs/heads/activemq-5.15.x from jbonofre
[ https://gitbox.apache.org/repos/asf?p=activemq.git;h=9ac7815 ]

[AMQ-7465] Protect any webconsole URL by default

(cherry picked from commit 93c245b8ec16849994f2cd4bb4a4b0bb73086ed1)


> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-22 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17114527#comment-17114527
 ] 

ASF subversion and git services commented on AMQ-7465:
--

Commit 93c245b8ec16849994f2cd4bb4a4b0bb73086ed1 in activemq's branch 
refs/heads/master from jbonofre
[ https://gitbox.apache.org/repos/asf?p=activemq.git;h=93c245b ]

[AMQ-7465] Protect any webconsole URL by default


> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-22 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17114529#comment-17114529
 ] 

ASF subversion and git services commented on AMQ-7465:
--

Commit e97322bddb06523981046f49225160a2b4347c3d in activemq's branch 
refs/heads/master from Jean-Baptiste Onofré
[ https://gitbox.apache.org/repos/asf?p=activemq.git;h=e97322b ]

Merge pull request #537 from jbonofre/AMQ-7465

[AMQ-7465] Protect any webconsole URL by default

> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-22 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17114528#comment-17114528
 ] 

ASF subversion and git services commented on AMQ-7465:
--

Commit e97322bddb06523981046f49225160a2b4347c3d in activemq's branch 
refs/heads/master from Jean-Baptiste Onofré
[ https://gitbox.apache.org/repos/asf?p=activemq.git;h=e97322b ]

Merge pull request #537 from jbonofre/AMQ-7465

[AMQ-7465] Protect any webconsole URL by default

> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-21 Thread Jira


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17112971#comment-17112971
 ] 

Jean-Baptiste Onofré commented on AMQ-7465:
---

See my change on [https://github.com/apache/activemq/pull/537]

I think it's what you are looking for.

> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-21 Thread Jira


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17112966#comment-17112966
 ] 

Jean-Baptiste Onofré commented on AMQ-7465:
---

I'm doing this change by default just in case.

> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-21 Thread Jira


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17112965#comment-17112965
 ] 

Jean-Baptiste Onofré commented on AMQ-7465:
---

Anyway, you can fully protect any URL by doing this change in 
{{conf/jetty.xml}}:
{code:java}
    
        
        
     {code}

> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-21 Thread Jira


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17112933#comment-17112933
 ] 

Jean-Baptiste Onofré commented on AMQ-7465:
---

Just a note: there's no "web directory" in ActiveMQ console, only jsp and 
protected. So I don't see any issue there. Do you have an example of URL where 
you see a problem ?

> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-05-21 Thread Jira


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17112932#comment-17112932
 ] 

Jean-Baptiste Onofré commented on AMQ-7465:
---

I don't understand the issue. I tried this URL: [http://localhost:8161//admin]

and I got a 404 (which is correct) with ActiveMQ 5.15.13-SNAPSHOT and 5.14.5.

Can you elaborate where is the security issue here ?

> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Assignee: Jean-Baptiste Onofré
>Priority: Critical
> Fix For: 5.16.0, 5.15.13
>
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (AMQ-7465) Xerver Double Slash Authentication Bypass detected on ActiveMQ directory

2020-04-13 Thread Bhavana (Jira)


[ 
https://issues.apache.org/jira/browse/AMQ-7465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17082213#comment-17082213
 ] 

Bhavana commented on AMQ-7465:
--

Above security vulnerability is detected in our server during the nesus scan. 
We are using 8162 port in our application.Could you please suggest us how to 
fix this issue.

> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory
> 
>
> Key: AMQ-7465
> URL: https://issues.apache.org/jira/browse/AMQ-7465
> Project: ActiveMQ
>  Issue Type: Bug
>  Components: Security/JAAS
>Affects Versions: 5.14.5
>Reporter: Bhavana
>Priority: Critical
>
> Xerver Double Slash Authentication Bypass detected on ActiveMQ directory.
> The version of Xerver installed on the remote host is affected by an 
> authentication bypass vulnerability. It is possible to access protected web 
> directories without authentication by prepending the directory with an extra 
> '/'character, as long as the directory is not recursively protected.
> A remote, unauthenticated attacker can leverage this issue to gain access to 
> protected web directories.
> Nessus was able to reproduce the issue using the following URL :
> [https://seliiuapp11022.seli.gic.ericsson.se:8162//admin/]
> We have assigned 8162 port for activemq GUI in our applications



--
This message was sent by Atlassian Jira
(v8.3.4#803005)