Bug 1858946 (CVE-2020-13932)

Summary: CVE-2020-13932 activemq: remote XSS in web console diagram plugin
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aboyko, aileenc, akoufoud, alazarot, almorale, anstephe, asoldano, atangrin, ataylor, bbaranow, bmaxwell, brian.stansberry, cdewolf, chazlett, darran.lofthouse, dblechte, dfediuck, dkreling, dosoudil, drieden, eedri, etirelli, extras-orphan, ganandan, ggaughan, gmalinko, gvarsami, ibek, iweiss, janstey, java-sig-commits, jawilson, jcoleman, jochrist, jperkins, jstastny, jwon, kconner, krathod, kverlaen, kwills, ldimaggi, lef, lgao, mgoldboi, michal.skrivanek, mnovotny, msochure, msvehla, nwallace, pdrozd, pjindal, pmackay, psotirop, puntogil, rguimara, rrajasek, rstancel, rsvoboda, rsynek, rwagner, sbonazzo, sdaley, sherold, smaestri, sthorger, tcunning, tkirby, tom.jenkinson, yturgema
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Apache ActiveMQ Artemis 2.14.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in activemq. A specifically crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-12-08 11:02:41 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1858947    

Description Guilherme de Almeida Suckevicz 2020-07-20 20:21:13 UTC
A specifically crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.

Reference:
https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt

Comment 10 errata-xmlrpc 2020-12-08 08:55:47 UTC
This issue has been addressed in the following products:

  Red Hat AMQ

Via RHSA-2020:5365 https://access.redhat.com/errata/RHSA-2020:5365

Comment 11 Product Security DevOps Team 2020-12-08 11:02:41 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-13932