Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-32719 (GCVE-0-2021-32719)
Vulnerability from cvelistv5 – Published: 2021-06-28 15:15 – Updated: 2024-08-03 23:25- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
| URL | Tags |
|---|---|
| https://github.com/rabbitmq/rabbitmq-server/secur… | x_refsource_CONFIRM |
| https://github.com/rabbitmq/rabbitmq-server/pull/3122 | x_refsource_MISC |
| https://herolab.usd.de/security-advisories/usd-20… | x_refsource_MISC |
| Vendor | Product | Version | |
|---|---|---|---|
| rabbitmq | rabbitmq-server |
Affected:
< 3.8.18
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:25:31.107Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/pull/3122"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://herolab.usd.de/security-advisories/usd-2021-0011/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "rabbitmq-server",
"vendor": "rabbitmq",
"versions": [
{
"status": "affected",
"version": "\u003c 3.8.18"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-80",
"description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-02T13:21:36.000Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/pull/3122"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://herolab.usd.de/security-advisories/usd-2021-0011/"
}
],
"source": {
"advisory": "GHSA-5452-hxj4-773x",
"discovery": "UNKNOWN"
},
"title": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in RabbitMQ federation management plugin",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-32719",
"STATE": "PUBLIC",
"TITLE": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in RabbitMQ federation management plugin"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rabbitmq-server",
"version": {
"version_data": [
{
"version_value": "\u003c 3.8.18"
}
]
}
}
]
},
"vendor_name": "rabbitmq"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x",
"refsource": "CONFIRM",
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x"
},
{
"name": "https://github.com/rabbitmq/rabbitmq-server/pull/3122",
"refsource": "MISC",
"url": "https://github.com/rabbitmq/rabbitmq-server/pull/3122"
},
{
"name": "https://herolab.usd.de/security-advisories/usd-2021-0011/",
"refsource": "MISC",
"url": "https://herolab.usd.de/security-advisories/usd-2021-0011/"
}
]
},
"source": {
"advisory": "GHSA-5452-hxj4-773x",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2021-32719",
"datePublished": "2021-06-28T15:15:11.000Z",
"dateReserved": "2021-05-12T00:00:00.000Z",
"dateUpdated": "2024-08-03T23:25:31.107Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-32719",
"date": "2026-05-20",
"epss": "0.0012",
"percentile": "0.30434"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.8.18\", \"matchCriteriaId\": \"C52E1AF8-08D4-41D5-AB4A-067FB17DCDDA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.\"}, {\"lang\": \"es\", \"value\": \"RabbitMQ es un broker de mensajer\\u00eda multiprotocolo. En rabbitmq-server versiones anteriores a 3.8.18, cuando un enlace de federaci\\u00f3n es mostrado en la Interfaz de Usuario de administraci\\u00f3n de RabbitMQ por medio del plugin \\\"rabbitmq_federation_management\\\", su etiqueta consumer se mostraba sin el saneamiento apropiado de la etiqueta (script). Esto permite potencialmente una ejecuci\\u00f3n de c\\u00f3digo JavaScript en el contexto de la p\\u00e1gina. El usuario debe haber iniciado sesi\\u00f3n y tener permisos elevados (gestionar flujos ascendentes y pol\\u00edticas de federaci\\u00f3n) para que esto ocurra. La vulnerabilidad est\\u00e1 parcheada en RabbitMQ versi\\u00f3n 3.8.18. Como soluci\\u00f3n alternativa, desactivar el plugin \\\"rabbitmq_federation_management\\\" y usar [CLI tools](https://www.rabbitmq.com/cli.html) en su lugar\"}]",
"id": "CVE-2021-32719",
"lastModified": "2024-11-21T06:07:35.680",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N\", \"baseScore\": 3.1, \"baseSeverity\": \"LOW\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.5, \"impactScore\": 2.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 4.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.7, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:N/I:P/A:N\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-06-28T16:15:08.593",
"references": "[{\"url\": \"https://github.com/rabbitmq/rabbitmq-server/pull/3122\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"https://herolab.usd.de/security-advisories/usd-2021-0011/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rabbitmq/rabbitmq-server/pull/3122\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"https://herolab.usd.de/security-advisories/usd-2021-0011/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-80\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-32719\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-06-28T16:15:08.593\",\"lastModified\":\"2024-11-21T06:07:35.680\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.\"},{\"lang\":\"es\",\"value\":\"RabbitMQ es un broker de mensajer\u00eda multiprotocolo. En rabbitmq-server versiones anteriores a 3.8.18, cuando un enlace de federaci\u00f3n es mostrado en la Interfaz de Usuario de administraci\u00f3n de RabbitMQ por medio del plugin \\\"rabbitmq_federation_management\\\", su etiqueta consumer se mostraba sin el saneamiento apropiado de la etiqueta (script). Esto permite potencialmente una ejecuci\u00f3n de c\u00f3digo JavaScript en el contexto de la p\u00e1gina. El usuario debe haber iniciado sesi\u00f3n y tener permisos elevados (gestionar flujos ascendentes y pol\u00edticas de federaci\u00f3n) para que esto ocurra. La vulnerabilidad est\u00e1 parcheada en RabbitMQ versi\u00f3n 3.8.18. Como soluci\u00f3n alternativa, desactivar el plugin \\\"rabbitmq_federation_management\\\" y usar [CLI tools](https://www.rabbitmq.com/cli.html) en su lugar\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.7,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-80\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.8.18\",\"matchCriteriaId\":\"C52E1AF8-08D4-41D5-AB4A-067FB17DCDDA\"}]}]}],\"references\":[{\"url\":\"https://github.com/rabbitmq/rabbitmq-server/pull/3122\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://herolab.usd.de/security-advisories/usd-2021-0011/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rabbitmq/rabbitmq-server/pull/3122\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://herolab.usd.de/security-advisories/usd-2021-0011/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
BDU:2021-03490
Vulnerability from fstec - Published: 28.06.2021{
"CVSS 2.0": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Pivotal Software Inc., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 3.8.18 (RabbitMQ), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0440\u043e\u043a\u0435\u0440\u0430 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 RabbitMQ \u0434\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 rabbitmq-server \u0434\u043e 3.8.2-1+deb10u2.astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-0319SE17\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 rabbitmq-server \u0434\u043e 3.8.2-1+deb10u2.astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-0422SE47",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "28.06.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.05.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "08.07.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-03490",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-32719",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "RabbitMQ, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0433\u0438\u043d\u0430 rabbitmq_federation_management \u0431\u0440\u043e\u043a\u0435\u0440\u0430 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 RabbitMQ, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b (\u0438\u043b\u0438 \\\u00ab\u041c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u0430\u044f \u0441\u0446\u0435\u043d\u0430\u0440\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430\\\u00bb) (CWE-79), \u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 script-related \u0442\u044d\u0433\u043e\u0432 HTML \u043d\u0430 \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0435 (\u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 XSS) (CWE-80)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0433\u0438\u043d\u0430 rabbitmq_federation_management \u0431\u0440\u043e\u043a\u0435\u0440\u0430 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 RabbitMQ \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u044f \u043c\u0435\u0440 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://access.redhat.com/security/cve/cve-2021-32719\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-32719\nhttps://herolab.usd.de/security-advisories/usd-2021-0011/\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-0319SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-0422SE78",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-79, CWE-80",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4)"
}
bit-rabbitmq-2021-32719
Vulnerability from bitnami_vulndb
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the rabbitmq_federation_management plugin, its consumer tag was rendered without proper tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the rabbitmq_federation_management plugin and use CLI tools instead.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "rabbitmq",
"purl": "pkg:bitnami/rabbitmq"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.8.18"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2021-32719"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*"
],
"severity": "Medium"
},
"details": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.",
"id": "BIT-rabbitmq-2021-32719",
"modified": "2025-05-20T10:02:07.006Z",
"published": "2024-03-06T11:03:23.676Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/rabbitmq/rabbitmq-server/pull/3122"
},
{
"type": "WEB",
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x"
},
{
"type": "WEB",
"url": "https://herolab.usd.de/security-advisories/usd-2021-0011/"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32719"
}
],
"schema_version": "1.5.0",
"summary": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in RabbitMQ federation management plugin"
}
CNVD-2021-49048
Vulnerability from cnvd - Published: 2021-07-10目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x
| Name | Pivotal Software RabbitMQ <3.8.18 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-32719",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-32719"
}
},
"description": "RabbitMQ\u662f\u4e00\u4e2a\u591a\u534f\u8bae\u6d88\u606f\u4ee3\u7406\u3002\n\nRabbitMQ 3.8.18\u4e4b\u524d\u7248\u672c\u7684rabbitmq-server\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u5bf9\u003cscript\u003e\u6807\u7b7e\u8fdb\u884c\u6b63\u786e\u8fc7\u6ee4\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884cJavaScript\u4ee3\u7801\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-49048",
"openTime": "2021-07-10",
"patchDescription": "RabbitMQ\u662f\u4e00\u4e2a\u591a\u534f\u8bae\u6d88\u606f\u4ee3\u7406\u3002\r\n\r\nRabbitMQ 3.8.18\u4e4b\u524d\u7248\u672c\u7684rabbitmq-server\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u5bf9\u003cscript\u003e\u6807\u7b7e\u8fdb\u884c\u6b63\u786e\u8fc7\u6ee4\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884cJavaScript\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "RabbitMQ\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2021-49048\uff09\u7684\u8865\u4e01",
"products": {
"product": "Pivotal Software RabbitMQ \u003c3.8.18"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-32719",
"serverity": "\u4f4e",
"submitTime": "2021-06-29",
"title": "RabbitMQ\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2021-49048\uff09"
}
FKIE_CVE-2021-32719
Vulnerability from fkie_nvd - Published: 2021-06-28 16:15 - Updated: 2024-11-21 06:074.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/rabbitmq/rabbitmq-server/pull/3122 | Patch, Third Party Advisory | |
| security-advisories@github.com | https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x | Mitigation, Third Party Advisory | |
| security-advisories@github.com | https://herolab.usd.de/security-advisories/usd-2021-0011/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rabbitmq/rabbitmq-server/pull/3122 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x | Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://herolab.usd.de/security-advisories/usd-2021-0011/ | Exploit, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C52E1AF8-08D4-41D5-AB4A-067FB17DCDDA",
"versionEndExcluding": "3.8.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead."
},
{
"lang": "es",
"value": "RabbitMQ es un broker de mensajer\u00eda multiprotocolo. En rabbitmq-server versiones anteriores a 3.8.18, cuando un enlace de federaci\u00f3n es mostrado en la Interfaz de Usuario de administraci\u00f3n de RabbitMQ por medio del plugin \"rabbitmq_federation_management\", su etiqueta consumer se mostraba sin el saneamiento apropiado de la etiqueta (script). Esto permite potencialmente una ejecuci\u00f3n de c\u00f3digo JavaScript en el contexto de la p\u00e1gina. El usuario debe haber iniciado sesi\u00f3n y tener permisos elevados (gestionar flujos ascendentes y pol\u00edticas de federaci\u00f3n) para que esto ocurra. La vulnerabilidad est\u00e1 parcheada en RabbitMQ versi\u00f3n 3.8.18. Como soluci\u00f3n alternativa, desactivar el plugin \"rabbitmq_federation_management\" y usar [CLI tools](https://www.rabbitmq.com/cli.html) en su lugar"
}
],
"id": "CVE-2021-32719",
"lastModified": "2024-11-21T06:07:35.680",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 2.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-28T16:15:08.593",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/pull/3122"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://herolab.usd.de/security-advisories/usd-2021-0011/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/pull/3122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://herolab.usd.de/security-advisories/usd-2021-0011/"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-80"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2021-32719
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-32719",
"description": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.",
"id": "GSD-2021-32719",
"references": [
"https://www.suse.com/security/cve/CVE-2021-32719.html",
"https://advisories.mageia.org/CVE-2021-32719.html",
"https://security.archlinux.org/CVE-2021-32719",
"https://access.redhat.com/errata/RHSA-2022:8851"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-32719"
],
"details": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.",
"id": "GSD-2021-32719",
"modified": "2023-12-13T01:23:09.318324Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-32719",
"STATE": "PUBLIC",
"TITLE": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in RabbitMQ federation management plugin"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rabbitmq-server",
"version": {
"version_data": [
{
"version_value": "\u003c 3.8.18"
}
]
}
}
]
},
"vendor_name": "rabbitmq"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x",
"refsource": "CONFIRM",
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x"
},
{
"name": "https://github.com/rabbitmq/rabbitmq-server/pull/3122",
"refsource": "MISC",
"url": "https://github.com/rabbitmq/rabbitmq-server/pull/3122"
},
{
"name": "https://herolab.usd.de/security-advisories/usd-2021-0011/",
"refsource": "MISC",
"url": "https://herolab.usd.de/security-advisories/usd-2021-0011/"
}
]
},
"source": {
"advisory": "GHSA-5452-hxj4-773x",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.8.18",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-32719"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/rabbitmq/rabbitmq-server/pull/3122",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/pull/3122"
},
{
"name": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x",
"refsource": "CONFIRM",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x"
},
{
"name": "https://herolab.usd.de/security-advisories/usd-2021-0011/",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://herolab.usd.de/security-advisories/usd-2021-0011/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
},
"lastModifiedDate": "2021-07-02T15:50Z",
"publishedDate": "2021-06-28T16:15Z"
}
}
}
OPENSUSE-SU-2021:1334-1
Vulnerability from csaf_opensuse - Published: 2021-10-04 14:05 - Updated: 2021-10-04 14:05| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rabbitmq-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rabbitmq-server fixes the following issues:\n\n- CVE-2021-32718: Fixed improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI (bsc#1187818).\n- CVE-2021-32719: Fixed improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin (bsc#1187819).\n- CVE-2021-22116: Fixed improper input validation may lead to DoS (bsc#1186203).\n\n- Use /run instead of /var/run in tmpfiles.d configuration (bsc#1185075).\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1334",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1334-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1334-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWIIK75CV5Y6TWUXN67IYXFNHIHRZSXN/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1334-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWIIK75CV5Y6TWUXN67IYXFNHIHRZSXN/"
},
{
"category": "self",
"summary": "SUSE Bug 1185075",
"url": "https://bugzilla.suse.com/1185075"
},
{
"category": "self",
"summary": "SUSE Bug 1186203",
"url": "https://bugzilla.suse.com/1186203"
},
{
"category": "self",
"summary": "SUSE Bug 1187818",
"url": "https://bugzilla.suse.com/1187818"
},
{
"category": "self",
"summary": "SUSE Bug 1187819",
"url": "https://bugzilla.suse.com/1187819"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22116 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32718 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32719 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32719/"
}
],
"title": "Security update for rabbitmq-server",
"tracking": {
"current_release_date": "2021-10-04T14:05:48Z",
"generator": {
"date": "2021-10-04T14:05:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1334-1",
"initial_release_date": "2021-10-04T14:05:48Z",
"revision_history": [
{
"date": "2021-10-04T14:05:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"product": {
"name": "erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"product_id": "erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"product": {
"name": "rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"product_id": "rabbitmq-server-3.8.3-lp152.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64",
"product": {
"name": "rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64",
"product_id": "rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64"
},
"product_reference": "erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-3.8.3-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64"
},
"product_reference": "rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
},
"product_reference": "rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22116"
}
],
"notes": [
{
"category": "general",
"text": "RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22116",
"url": "https://www.suse.com/security/cve/CVE-2021-22116"
},
{
"category": "external",
"summary": "SUSE Bug 1186203 for CVE-2021-22116",
"url": "https://bugzilla.suse.com/1186203"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-04T14:05:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-22116"
},
{
"cve": "CVE-2021-32718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32718"
}
],
"notes": [
{
"category": "general",
"text": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user\u0027s bane being rendered in a confirmation message without proper `\u003cscript\u003e` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32718",
"url": "https://www.suse.com/security/cve/CVE-2021-32718"
},
{
"category": "external",
"summary": "SUSE Bug 1187818 for CVE-2021-32718",
"url": "https://bugzilla.suse.com/1187818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-04T14:05:48Z",
"details": "low"
}
],
"title": "CVE-2021-32718"
},
{
"cve": "CVE-2021-32719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32719"
}
],
"notes": [
{
"category": "general",
"text": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32719",
"url": "https://www.suse.com/security/cve/CVE-2021-32719"
},
{
"category": "external",
"summary": "SUSE Bug 1187819 for CVE-2021-32719",
"url": "https://bugzilla.suse.com/1187819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:erlang-rabbitmq-client-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-3.8.3-lp152.2.3.1.x86_64",
"openSUSE Leap 15.2:rabbitmq-server-plugins-3.8.3-lp152.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-04T14:05:48Z",
"details": "low"
}
],
"title": "CVE-2021-32719"
}
]
}
OPENSUSE-SU-2021:3325-1
Vulnerability from csaf_opensuse - Published: 2021-10-09 17:45 - Updated: 2021-10-09 17:45| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rabbitmq-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rabbitmq-server fixes the following issues:\n\n- CVE-2021-32718: Fixed improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI (bsc#1187818).\n- CVE-2021-32719: Fixed improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin (bsc#1187819).\n- CVE-2021-22116: Fixed improper input validation may lead to DoS (bsc#1186203).\n\n- Use /run instead of /var/run in tmpfiles.d configuration (bsc#1185075).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-3325",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3325-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:3325-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NL4I6R5WB6N3LAJGL2UC3TXXGKBNRLE/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:3325-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NL4I6R5WB6N3LAJGL2UC3TXXGKBNRLE/"
},
{
"category": "self",
"summary": "SUSE Bug 1185075",
"url": "https://bugzilla.suse.com/1185075"
},
{
"category": "self",
"summary": "SUSE Bug 1186203",
"url": "https://bugzilla.suse.com/1186203"
},
{
"category": "self",
"summary": "SUSE Bug 1187818",
"url": "https://bugzilla.suse.com/1187818"
},
{
"category": "self",
"summary": "SUSE Bug 1187819",
"url": "https://bugzilla.suse.com/1187819"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22116 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32718 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32719 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32719/"
}
],
"title": "Security update for rabbitmq-server",
"tracking": {
"current_release_date": "2021-10-09T17:45:06Z",
"generator": {
"date": "2021-10-09T17:45:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:3325-1",
"initial_release_date": "2021-10-09T17:45:06Z",
"revision_history": [
{
"date": "2021-10-09T17:45:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"product": {
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"product_id": "erlang-rabbitmq-client-3.8.11-3.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-3.8.11-3.3.3.aarch64",
"product": {
"name": "rabbitmq-server-3.8.11-3.3.3.aarch64",
"product_id": "rabbitmq-server-3.8.11-3.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"product": {
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"product_id": "rabbitmq-server-plugins-3.8.11-3.3.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"product": {
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"product_id": "erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-3.8.11-3.3.3.ppc64le",
"product": {
"name": "rabbitmq-server-3.8.11-3.3.3.ppc64le",
"product_id": "rabbitmq-server-3.8.11-3.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"product": {
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"product_id": "rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"product": {
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"product_id": "erlang-rabbitmq-client-3.8.11-3.3.3.s390x"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-3.8.11-3.3.3.s390x",
"product": {
"name": "rabbitmq-server-3.8.11-3.3.3.s390x",
"product_id": "rabbitmq-server-3.8.11-3.3.3.s390x"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"product": {
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"product_id": "rabbitmq-server-plugins-3.8.11-3.3.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"product": {
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"product_id": "erlang-rabbitmq-client-3.8.11-3.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-3.8.11-3.3.3.x86_64",
"product": {
"name": "rabbitmq-server-3.8.11-3.3.3.x86_64",
"product_id": "rabbitmq-server-3.8.11-3.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.x86_64",
"product": {
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.x86_64",
"product_id": "rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64"
},
"product_reference": "erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le"
},
"product_reference": "erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x"
},
"product_reference": "erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-rabbitmq-client-3.8.11-3.3.3.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64"
},
"product_reference": "erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-3.8.11-3.3.3.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64"
},
"product_reference": "rabbitmq-server-3.8.11-3.3.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-3.8.11-3.3.3.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le"
},
"product_reference": "rabbitmq-server-3.8.11-3.3.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-3.8.11-3.3.3.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x"
},
"product_reference": "rabbitmq-server-3.8.11-3.3.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-3.8.11-3.3.3.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64"
},
"product_reference": "rabbitmq-server-3.8.11-3.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64"
},
"product_reference": "rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le"
},
"product_reference": "rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x"
},
"product_reference": "rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-plugins-3.8.11-3.3.3.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
},
"product_reference": "rabbitmq-server-plugins-3.8.11-3.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22116"
}
],
"notes": [
{
"category": "general",
"text": "RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22116",
"url": "https://www.suse.com/security/cve/CVE-2021-22116"
},
{
"category": "external",
"summary": "SUSE Bug 1186203 for CVE-2021-22116",
"url": "https://bugzilla.suse.com/1186203"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-09T17:45:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-22116"
},
{
"cve": "CVE-2021-32718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32718"
}
],
"notes": [
{
"category": "general",
"text": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user\u0027s bane being rendered in a confirmation message without proper `\u003cscript\u003e` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32718",
"url": "https://www.suse.com/security/cve/CVE-2021-32718"
},
{
"category": "external",
"summary": "SUSE Bug 1187818 for CVE-2021-32718",
"url": "https://bugzilla.suse.com/1187818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-09T17:45:06Z",
"details": "low"
}
],
"title": "CVE-2021-32718"
},
{
"cve": "CVE-2021-32719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32719"
}
],
"notes": [
{
"category": "general",
"text": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32719",
"url": "https://www.suse.com/security/cve/CVE-2021-32719"
},
{
"category": "external",
"summary": "SUSE Bug 1187819 for CVE-2021-32719",
"url": "https://bugzilla.suse.com/1187819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:erlang-rabbitmq-client-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-3.8.11-3.3.3.x86_64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.aarch64",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.ppc64le",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.s390x",
"openSUSE Leap 15.3:rabbitmq-server-plugins-3.8.11-3.3.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-09T17:45:06Z",
"details": "low"
}
],
"title": "CVE-2021-32719"
}
]
}
RHSA-2022:8851
Vulnerability from csaf_redhat - Published: 2022-12-07 19:19 - Updated: 2025-11-21 18:35RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64 | — |
Vendor Fix
fix
|
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper <script> tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rabbitmq-server is now available for Red Hat OpenStack\nPlatform 16.2.4 (Train) for Red Hat Enterprise Linux (RHEL) 8.4.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "RabbitMQ is an implementation of AMQP, the emerging standard for high\nperformance enterprise messaging. The RabbitMQ server is a robust and\nscalable implementation of an AMQP broker. # We want to install into\n/usr/lib, even on 64-bit platforms\n\nSecurity Fix(es):\n\n* improper neutralization of script-related HTML tags in a web page (basic\nXSS) in management UI (CVE-2021-32718)\n\n* improper neutralization of script-related HTML tags in a web page (basic\nXSS) in federation management plugin (CVE-2021-32719)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8851",
"url": "https://access.redhat.com/errata/RHSA-2022:8851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1977002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977002"
},
{
"category": "external",
"summary": "1977008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977008"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8851.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (rabbitmq-server) security update",
"tracking": {
"current_release_date": "2025-11-21T18:35:28+00:00",
"generator": {
"date": "2025-11-21T18:35:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:8851",
"initial_release_date": "2022-12-07T19:19:42+00:00",
"revision_history": [
{
"date": "2022-12-07T19:19:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-07T19:19:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:35:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "rabbitmq-server-0:3.8.16-3.el8ost.src",
"product": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.src",
"product_id": "rabbitmq-server-0:3.8.16-3.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rabbitmq-server@3.8.16-3.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64",
"product": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64",
"product_id": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rabbitmq-server@3.8.16-3.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"product": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"product_id": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rabbitmq-server@3.8.16-3.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le"
},
"product_reference": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.src as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src"
},
"product_reference": "rabbitmq-server-0:3.8.16-3.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
},
"product_reference": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32718",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1977002"
}
],
"notes": [
{
"category": "description",
"text": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user\u0027s bane being rendered in a confirmation message without proper `\u003cscript\u003e` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform ships a vulnerable version of RabbitMQ but it is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32718"
},
{
"category": "external",
"summary": "RHBZ#1977002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32718",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32718"
}
],
"release_date": "2021-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-07T19:19:42+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI"
},
{
"cve": "CVE-2021-32719",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1977008"
}
],
"notes": [
{
"category": "description",
"text": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform ships a vulnerable version of RabbitMQ but it is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32719"
},
{
"category": "external",
"summary": "RHBZ#1977008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977008"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32719",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32719"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-07T19:19:42+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin"
}
]
}
RHSA-2022_8851
Vulnerability from csaf_redhat - Published: 2022-12-07 19:19 - Updated: 2024-11-22 20:15RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64 | — |
Vendor Fix
fix
|
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper <script> tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rabbitmq-server is now available for Red Hat OpenStack\nPlatform 16.2.4 (Train) for Red Hat Enterprise Linux (RHEL) 8.4.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "RabbitMQ is an implementation of AMQP, the emerging standard for high\nperformance enterprise messaging. The RabbitMQ server is a robust and\nscalable implementation of an AMQP broker. # We want to install into\n/usr/lib, even on 64-bit platforms\n\nSecurity Fix(es):\n\n* improper neutralization of script-related HTML tags in a web page (basic\nXSS) in management UI (CVE-2021-32718)\n\n* improper neutralization of script-related HTML tags in a web page (basic\nXSS) in federation management plugin (CVE-2021-32719)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8851",
"url": "https://access.redhat.com/errata/RHSA-2022:8851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1977002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977002"
},
{
"category": "external",
"summary": "1977008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977008"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8851.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (rabbitmq-server) security update",
"tracking": {
"current_release_date": "2024-11-22T20:15:55+00:00",
"generator": {
"date": "2024-11-22T20:15:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:8851",
"initial_release_date": "2022-12-07T19:19:42+00:00",
"revision_history": [
{
"date": "2022-12-07T19:19:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-07T19:19:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T20:15:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "rabbitmq-server-0:3.8.16-3.el8ost.src",
"product": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.src",
"product_id": "rabbitmq-server-0:3.8.16-3.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rabbitmq-server@3.8.16-3.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64",
"product": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64",
"product_id": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rabbitmq-server@3.8.16-3.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"product": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"product_id": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rabbitmq-server@3.8.16-3.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le"
},
"product_reference": "rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.src as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src"
},
"product_reference": "rabbitmq-server-0:3.8.16-3.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
},
"product_reference": "rabbitmq-server-0:3.8.16-3.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32718",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1977002"
}
],
"notes": [
{
"category": "description",
"text": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user\u0027s bane being rendered in a confirmation message without proper `\u003cscript\u003e` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform ships a vulnerable version of RabbitMQ but it is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32718"
},
{
"category": "external",
"summary": "RHBZ#1977002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32718",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32718"
}
],
"release_date": "2021-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-07T19:19:42+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI"
},
{
"cve": "CVE-2021-32719",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1977008"
}
],
"notes": [
{
"category": "description",
"text": "RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper \u003cscript\u003e tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform ships a vulnerable version of RabbitMQ but it is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32719"
},
{
"category": "external",
"summary": "RHBZ#1977008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977008"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32719",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32719"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-07T19:19:42+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.ppc64le",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.src",
"8Base-RHOS-16.2:rabbitmq-server-0:3.8.16-3.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.