TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-11775.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.1.3.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.0.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.2.0.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.0.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.0.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.1.0.0"
}
]
}
]