VYPR
Moderate severityNVD Advisory· Published Jul 20, 2013· Updated Apr 29, 2026

CVE-2013-1879

CVE-2013-1879

Description

Cross-site scripting (XSS) vulnerability in scheduled.jsp in Apache ActiveMQ 5.8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving the "cron of a message."

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.activemq:activemq-clientMaven
< 5.9.05.9.0

Affected products

14
  • Apache/Activemq14 versions
    cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*+ 13 more
    • cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*range: <=5.8.0
    • cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*

Patches

1
148ca81dcd8f

https://issues.apache.org/jira/browse/AMQ-4397 - xss in cron expressions

https://github.com/apache/activemqBosanac DejanMar 21, 2013via ghsa
2 files changed · +8 8
  • activemq-client/src/main/java/org/apache/activemq/broker/scheduler/CronParser.java+1 1 modified
    @@ -42,7 +42,7 @@ public static long getNextScheduledTime(final String cronEntry, long currentTime
     
             // Handle the once per minute case "* * * * *"
             // starting the next event at the top of the minute.
    -        if (cronEntry.startsWith("* * * * *")) {
    +        if (cronEntry.equals("* * * * *")) {
                 result = currentTime + 60 * 1000;
                 result = result / 1000 * 1000;
                 return result;
    
  • activemq-web-console/src/main/webapp/scheduled.jsp+7 7 modified
    @@ -40,13 +40,13 @@
     		<c:forEach items="${requestContext.brokerQuery.scheduledJobs}"
     		var="row">
     		<tr>
    -		 <td>${row.jobId}</td>
    -		 <td>${row.cronEntry}</td>
    -		 <td>${row.nextExecutionTime}</td>
    -		 <td>${row.start}</td>
    -		 <td>${row.delay}</td>
    -	 	 <td>${row.period}</td>
    -	     <td>${row.repeat}</td>
    +		 <td><c:out value="${row.jobId}"/></td>
    +		 <td><c:out value="${row.cronEntry}"/></td>
    +		 <td><c:out value="${row.nextExecutionTime}"/></td>
    +		 <td><c:out value="${row.start}"/></td>
    +		 <td><c:out value="${row.delay}"/></td>
    +	 	 <td><c:out value="${row.period}"/></td>
    +	     <td><c:out value="${row.repeat}"/></td>
     		<td>
     		    <a href="deleteJob.action?jobId=${row.jobId}&secret=<c:out value='${sessionScope["secret"]}'/>">Delete</a>
     		</td>
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.