diff --git a/cve/apache-activemq/CVE-2022-35278/CVE-2022-35278.yaml b/cve/apache-activemq/CVE-2022-35278/CVE-2022-35278.yaml new file mode 100644 index 0000000000000000000000000000000000000000..fe61a346c1dc084f12c3fd93082eabb50b730fdd --- /dev/null +++ b/cve/apache-activemq/CVE-2022-35278/CVE-2022-35278.yaml @@ -0,0 +1,21 @@ +id: CVE-2022-35278 +source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35278 +info: + name: Apache ActiveMQ Artemis + severity: medium + description: | + In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show malicious content and/or redirect users to a malicious URL in the web console by using HTML in the name of an address or queue. + scope-of-influence: + Apache ActiveMQ Artemis version <= 2.24.0 + reference: + - CONFIRM:https://security.netapp.com/advisory/ntap-20221209-0005/ + - MISC:https://lists.apache.org/thread/bh6y81wtotg75337bpvxcjy436zfgf3n + - URL:https://lists.apache.org/thread/bh6y81wtotg75337bpvxcjy436zfgf3n + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-35278 + cwe-id: CWE-79, CWE-80 + cnvd-id: None + kve-id: None + tags: cve2022, web \ No newline at end of file