[jira] [Commented] (AMQ-9197) Prototype Javascript Framework - CVE-2020-27511

2023-02-08 Thread Nikhil (Jira)


[ 
https://issues.apache.org/jira/browse/AMQ-9197?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17686168#comment-17686168
 ] 

Nikhil commented on AMQ-9197:
-

Hi [~jbonofre] 

 

Thanks for the quick fix.. Do you have any timeline for the ActiveMQ 5.16.6 
release ?

I see that the last release of 5.16.x (I.e., 5.16.5) is released in May 2022 so 
just wanted to understand the plan.

 

Thank you..

> Prototype Javascript Framework - CVE-2020-27511
> ---
>
> Key: AMQ-9197
> URL: https://issues.apache.org/jira/browse/AMQ-9197
> Project: ActiveMQ
>  Issue Type: Dependency upgrade
>  Components: Web Console
>Affects Versions: 5.16.3, 5.16.4, 5.16.5
>Reporter: Nikhil
>Assignee: Jean-Baptiste Onofré
>Priority: Major
> Fix For: 5.18.0, 5.16.6, 5.17.4
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> An issue was discovered in the stripTags and unescapeHTML components in 
> Prototype 1.7.1 version 1.6 and below where an attacker can cause a Regular 
> Expression Denial of Service (ReDOS) through stripping crafted HTML tags.
>  
> See [https://nvd.nist.gov/vuln/detail/CVE-2020-27511] for further details
>  
> *prototype.js* is part of activemq-web-5.16.3.jar which is shipped inside 
> *activemq-web-console.war*
>  
> Can someone please confirm the affected projects of activeMQ for this 
> prototype.js library..



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (AMQ-9197) Prototype Javascript Framework - CVE-2020-27511

2023-02-05 Thread Nikhil (Jira)


[ 
https://issues.apache.org/jira/browse/AMQ-9197?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17684471#comment-17684471
 ] 

Nikhil commented on AMQ-9197:
-

Hi [~jbonofre] 

 

Looks like the vulnerable code exists in older versions as well through *1.6.x* 
which is part of ActiveMQ library.. this is fixed in *1.7.1-3* version of 
prototype.js module.. Could you please review once ?

 

Reference - [https://security-tracker.debian.org/tracker/CVE-2020-27511] 

 

Thank you!

> Prototype Javascript Framework - CVE-2020-27511
> ---
>
> Key: AMQ-9197
> URL: https://issues.apache.org/jira/browse/AMQ-9197
> Project: ActiveMQ
>  Issue Type: Dependency upgrade
>  Components: Web Console
>Affects Versions: 5.16.3, 5.16.4, 5.16.5
>Reporter: Nikhil
>Assignee: Jean-Baptiste Onofré
>Priority: Major
>
> An issue was discovered in the stripTags and unescapeHTML components in 
> Prototype 1.7.3 version 1.6 and below where an attacker can cause a Regular 
> Expression Denial of Service (ReDOS) through stripping crafted HTML tags.
>  
> See [https://nvd.nist.gov/vuln/detail/CVE-2020-27511] for further details
>  
> *prototype.js* is part of activemq-web-5.16.3.jar which is shipped inside 
> *activemq-web-console.war*
>  
> Can someone please confirm the affected projects of activeMQ for this 
> prototype.js library..



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Reopened] (AMQ-9197) Prototype Javascript Framework - CVE-2020-27511

2023-02-05 Thread Nikhil (Jira)


 [ 
https://issues.apache.org/jira/browse/AMQ-9197?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nikhil reopened AMQ-9197:
-

> Prototype Javascript Framework - CVE-2020-27511
> ---
>
> Key: AMQ-9197
> URL: https://issues.apache.org/jira/browse/AMQ-9197
> Project: ActiveMQ
>  Issue Type: Dependency upgrade
>  Components: Web Console
>Affects Versions: 5.16.3, 5.16.4, 5.16.5
>Reporter: Nikhil
>Assignee: Jean-Baptiste Onofré
>Priority: Major
>
> An issue was discovered in the stripTags and unescapeHTML components in 
> Prototype 1.7.3 version 1.6 and below where an attacker can cause a Regular 
> Expression Denial of Service (ReDOS) through stripping crafted HTML tags.
>  
> See [https://nvd.nist.gov/vuln/detail/CVE-2020-27511] for further details
>  
> *prototype.js* is part of activemq-web-5.16.3.jar which is shipped inside 
> *activemq-web-console.war*
>  
> Can someone please confirm the affected projects of activeMQ for this 
> prototype.js library..



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (AMQ-9195) Upgrade XStream to 1.4.20 - CVE-2022-41966

2023-01-22 Thread Nikhil (Jira)


[ 
https://issues.apache.org/jira/browse/AMQ-9195?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17679696#comment-17679696
 ] 

Nikhil commented on AMQ-9195:
-

Few other vulnerabilities were also fixed as part of 1.4.20 version.

 

Please see [https://github.com/x-stream/xstream/issues/304] and 
[https://github.com/x-stream/xstream/issues/314] for more details.

> Upgrade XStream to 1.4.20 - CVE-2022-41966
> --
>
> Key: AMQ-9195
> URL: https://issues.apache.org/jira/browse/AMQ-9195
> Project: ActiveMQ
>  Issue Type: Dependency upgrade
>Affects Versions: 5.16.5
>Reporter: Nikhil
>Priority: Major
>
> {*}Summary{*}: XStream serializes Java objects to XML and back again. 
> Versions prior to 1.4.20 may allow a remote attacker to terminate the 
> application with a stack overflow error, resulting in a denial of service 
> only via manipulation the processed input stream. The attack uses the hash 
> code implementation for collections and maps to force recursive hash 
> calculation causing a stack overflow. This issue is patched in version 1.4.20 
> which handles the stack overflow and raises an InputManipulationException 
> instead. A potential workaround for users who only use HashMap or HashSet and 
> whose XML refers these only as default map or set, is to change the default 
> implementation of java.util.Map and java.util per the code example in the 
> referenced advisory. However, this implies that your application does not 
> care about the implementation of the map and all elements are comparable.
>  
> {*}Solution{*}: Fixed in version *1.4.20* by this commit.
>  
> Since ActiveMQ web console uses this library (XStream) - I think we will need 
> to update this to 1.4.20, currently we are using *1.4.19* in *5.16.5*



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (AMQ-9197) Prototype Javascript Framework - CVE-2020-27511

2023-01-15 Thread Nikhil (Jira)
Nikhil created AMQ-9197:
---

 Summary: Prototype Javascript Framework - CVE-2020-27511
 Key: AMQ-9197
 URL: https://issues.apache.org/jira/browse/AMQ-9197
 Project: ActiveMQ
  Issue Type: Dependency upgrade
Affects Versions: 5.16.5, 5.16.4, 5.16.3
Reporter: Nikhil


An issue was discovered in the stripTags and unescapeHTML components in 
Prototype 1.7.3 version 1.6 and below where an attacker can cause a Regular 
Expression Denial of Service (ReDOS) through stripping crafted HTML tags.

 

See [https://nvd.nist.gov/vuln/detail/CVE-2020-27511] for further details

 

*prototype.js* is part of activemq-web-5.16.3.jar which is shipped inside 
*activemq-web-console.war*

 

Can someone please confirm the affected projects of activeMQ for this 
prototype.js library..



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (AMQ-9195) Upgrade XStream to 1.4.20 - CVE-2022-41966

2023-01-11 Thread Nikhil (Jira)


 [ 
https://issues.apache.org/jira/browse/AMQ-9195?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nikhil updated AMQ-9195:

Summary: Upgrade XStream to 1.4.20 - CVE-2022-41966  (was: XStream - 
CVE-2022-41966)

> Upgrade XStream to 1.4.20 - CVE-2022-41966
> --
>
> Key: AMQ-9195
> URL: https://issues.apache.org/jira/browse/AMQ-9195
> Project: ActiveMQ
>  Issue Type: Dependency upgrade
>Affects Versions: 5.16.5
>Reporter: Nikhil
>Priority: Major
>
> {*}Summary{*}: XStream serializes Java objects to XML and back again. 
> Versions prior to 1.4.20 may allow a remote attacker to terminate the 
> application with a stack overflow error, resulting in a denial of service 
> only via manipulation the processed input stream. The attack uses the hash 
> code implementation for collections and maps to force recursive hash 
> calculation causing a stack overflow. This issue is patched in version 1.4.20 
> which handles the stack overflow and raises an InputManipulationException 
> instead. A potential workaround for users who only use HashMap or HashSet and 
> whose XML refers these only as default map or set, is to change the default 
> implementation of java.util.Map and java.util per the code example in the 
> referenced advisory. However, this implies that your application does not 
> care about the implementation of the map and all elements are comparable.
>  
> {*}Solution{*}: Fixed in version *1.4.20* by this commit.
>  
> Since ActiveMQ web console uses this library (XStream) - I think we will need 
> to update this to 1.4.20, currently we are using *1.4.19* in *5.16.5*



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (AMQ-9195) XStream - CVE-2022-41966

2023-01-11 Thread Nikhil (Jira)
Nikhil created AMQ-9195:
---

 Summary: XStream - CVE-2022-41966
 Key: AMQ-9195
 URL: https://issues.apache.org/jira/browse/AMQ-9195
 Project: ActiveMQ
  Issue Type: Dependency upgrade
Affects Versions: 5.16.5
Reporter: Nikhil


{*}Summary{*}: XStream serializes Java objects to XML and back again. Versions 
prior to 1.4.20 may allow a remote attacker to terminate the application with a 
stack overflow error, resulting in a denial of service only via manipulation 
the processed input stream. The attack uses the hash code implementation for 
collections and maps to force recursive hash calculation causing a stack 
overflow. This issue is patched in version 1.4.20 which handles the stack 
overflow and raises an InputManipulationException instead. A potential 
workaround for users who only use HashMap or HashSet and whose XML refers these 
only as default map or set, is to change the default implementation of 
java.util.Map and java.util per the code example in the referenced advisory. 
However, this implies that your application does not care about the 
implementation of the map and all elements are comparable.

 

{*}Solution{*}: Fixed in version *1.4.20* by this commit.

 

Since ActiveMQ web console uses this library (XStream) - I think we will need 
to update this to 1.4.20, currently we are using *1.4.19* in *5.16.5*



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (AMQ-8603) In the documentation of redilevery policy redelivery policy map is mentioned twice

2022-05-14 Thread Nikhil (Jira)
Nikhil created AMQ-8603:
---

 Summary: In the documentation of redilevery policy redelivery 
policy map is mentioned twice
 Key: AMQ-8603
 URL: https://issues.apache.org/jira/browse/AMQ-8603
 Project: ActiveMQ
  Issue Type: Improvement
  Components: Documentation
Affects Versions: 5.16.5
Reporter: Nikhil
 Attachments: redelivery-policy-map-twice.PNG

The redelivery policy map is defined twice. I am attaching a screenshot to help 
you find hte issue.

 

Here is the link to the documentation:- 
https://activemq.apache.org/message-redelivery-and-dlq-handling



--
This message was sent by Atlassian Jira
(v8.20.7#820007)