Vulnerabilites related to broadcom - rabbitmq_server
Vulnerability from fkie_nvd
Published
2015-01-27 20:02
Modified
2025-04-02 14:13
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2F0CBEC-F440-45A0-8ED3-59C38B105BCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E1C34F-3CD0-40AD-83F8-4F1B941F0838",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F741941D-F4C9-4F29-ADFF-AC8A4234DFDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DE2226B-850C-48BF-BF22-4061EF8262D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED11458-F118-440F-88BE-E9EEF1231143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82788D-183B-4177-B802-5941EB2390D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D4A89FF-EEA9-4BAF-8F83-D9BCE1617544",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51C91577-54C8-42BD-A5D2-17BBFDC72C0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "48FBD054-FEA5-4550-88CF-02C5DE814198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D97CE3D-526F-4841-B235-03E7C91F60FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5F2EB8D-698A-4937-8272-035792C07E79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE95D715-9F21-446B-8AFA-6B2CB5619DFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A39BD4-AB61-44B9-B5C9-FB6536F69A44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "66E07A00-731E-4F8B-B670-347EB96F6991",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A72AC2-F9A6-4ADF-8930-D39BA92DED89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753E6C4-00C7-4297-8E98-D07BE9E3AF15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2875491-991A-4014-B99C-A042A5D870DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB67C92-9D18-48C5-A6E7-1CBE9F9AD4A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2AC8B6-9743-4167-AF3A-EAF5D9AE53E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC8A2268-4FA1-405A-9CA6-2522F5AA68CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C6F7816-AB21-4D34-A98F-0159737329AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93A123A0-1EDC-4EF6-9300-A265837EC18C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1069E3-5DAE-4B10-A18E-2FB8BE9CF8EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "856A46DD-B7B0-4649-9ADC-6927BDDFC2FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4AA3927-F1D2-472D-A505-5CED02059978",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A465750-6168-4319-866B-D844EB4C88FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D27EDB36-9C20-471D-AFE3-36F62A2C106C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "682BA23A-199F-4591-AD30-EF43B34C227F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D55283F-EA8E-4D12-B49E-D5392242CCF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE08D41D-9782-44B1-A051-EF4BEC861C51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DA0EBB7-35CF-4C57-99E3-F5AA0F09781F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "051E5698-D006-4BE9-9C7E-5E70654CC1E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D29505A-FE4D-4CC2-96EA-13439B1536D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B7EA539-A2AB-4FD4-8CB5-575A594437F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EB3E04F-7C2D-4121-94E6-09C31BA44C37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFAC64E9-0DF2-4350-B2A9-225E841CCF74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8691A77-2BD3-4C6B-97BA-C5904149D9DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B22BC770-52AF-44DD-BEC7-B989B8C08717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1CE91D7-DA1B-4547-B903-A2536E4B3EA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1078BE-B70C-4419-95AC-68ED4AC56EDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "27719DEB-CC36-4DAB-8564-248263F48010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7975F3B-30A9-445B-9D39-8A308670264B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "80944B21-FAC3-49A6-878F-173B5A5AD24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "755456D9-7249-4092-970C-230729E2F856",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de XSS en el plugin de gestión en RabbitMQ 2.1.0 hasta 3.4.x anterior a 3.4.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de la información de rutas en api/, lo que no se maneja correctamente en un mensaje de error.",
      },
   ],
   id: "CVE-2014-9649",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2015-01-27T20:02:39.637",
   references: [
      {
         source: "security@ubuntu.com",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.securityfocus.com/bid/76084",
      },
      {
         source: "security@ubuntu.com",
         url: "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/76084",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs",
      },
   ],
   sourceIdentifier: "security@ubuntu.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-06 18:16
Modified
2025-04-02 14:13
Summary
RabbitMQ is a multi-protocol messaging and streaming broker. In affected versions the shovel and federation plugins perform URI obfuscation in their worker (link) state. The encryption key used to encrypt the URI was seeded with a predictable secret. This means that in case of certain exceptions related to Shovel and Federation plugins, reasonably easily deobfuscatable data could appear in the node log. Patched versions correctly use a cluster-wide secret for that purpose. This issue has been addressed and Patched versions: `3.10.2`, `3.9.18`, `3.8.32` are available. Users unable to upgrade should disable the Shovel and Federation plugins.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D84222E-FE12-4A6F-9FDF-8EC477F9D507",
                     versionEndExcluding: "3.9.18",
                     versionStartIncluding: "3.9.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E1674E7-CC0A-43A0-AE45-BDC4355A70E4",
                     versionEndExcluding: "3.10.2",
                     versionStartIncluding: "3.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7ACC5FD-236D-4454-B306-C5C8F70FB5B7",
                     versionEndExcluding: "3.8.32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "RabbitMQ is a multi-protocol messaging and streaming broker. In affected versions the shovel and federation plugins perform URI obfuscation in their worker (link) state. The encryption key used to encrypt the URI was seeded with a predictable secret. This means that in case of certain exceptions related to Shovel and Federation plugins, reasonably easily deobfuscatable data could appear in the node log. Patched versions correctly use a cluster-wide secret for that purpose. This issue has been addressed and Patched versions: `3.10.2`, `3.9.18`, `3.8.32` are available. Users unable to upgrade should disable the Shovel and Federation plugins.",
      },
      {
         lang: "es",
         value: "RabbitMQ es un broker de mensajería y streaming multiprotocolo. En versiones afectadas los plugins shovel y federation llevan a cabo una ofuscación de URI en su estado de trabajador (enlace). La clave de cifrado usada para cifrar el URI fue sembrada con un secreto predecible. Esto significa que en caso de determinadas excepciones relacionadas con los plugins Shovel y Federation, podrían aparecer datos razonablemente fáciles de des ofuscar en el registro del nodo. Las versiones parcheadas usan correctamente un secreto para todo el clúster a tal efecto. Este problema se ha solucionado y las versiones parcheadas: \"3.10.2\", \"3.9.18\", \"3.8.32\" están disponibles. Los usuarios que no puedan actualizar deberán deshabilitar los plugins Shovel y Federation",
      },
   ],
   id: "CVE-2022-31008",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-06T18:16:00.783",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/rabbitmq/rabbitmq-server/pull/4841",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-v9gv-xp36-jgj8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/rabbitmq/rabbitmq-server/pull/4841",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-v9gv-xp36-jgj8",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-330",
            },
         ],
         source: "security-advisories@github.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-335",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-12-29 09:59
Modified
2025-04-02 14:13
Severity ?
Summary
An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
Impacted products
Vendor Product Version
broadcom rabbitmq_server 3.0.0
broadcom rabbitmq_server 3.0.1
broadcom rabbitmq_server 3.0.2
broadcom rabbitmq_server 3.0.3
broadcom rabbitmq_server 3.0.4
broadcom rabbitmq_server 3.1.0
broadcom rabbitmq_server 3.1.1
broadcom rabbitmq_server 3.1.2
broadcom rabbitmq_server 3.1.3
broadcom rabbitmq_server 3.1.4
broadcom rabbitmq_server 3.1.5
broadcom rabbitmq_server 3.2.0
broadcom rabbitmq_server 3.2.1
broadcom rabbitmq_server 3.2.2
broadcom rabbitmq_server 3.2.3
broadcom rabbitmq_server 3.2.4
broadcom rabbitmq_server 3.3.0
broadcom rabbitmq_server 3.3.1
broadcom rabbitmq_server 3.3.2
broadcom rabbitmq_server 3.3.3
broadcom rabbitmq_server 3.3.4
broadcom rabbitmq_server 3.3.5
broadcom rabbitmq_server 3.4.0
broadcom rabbitmq_server 3.4.1
broadcom rabbitmq_server 3.4.2
broadcom rabbitmq_server 3.4.3
broadcom rabbitmq_server 3.4.4
broadcom rabbitmq_server 3.5.0
broadcom rabbitmq_server 3.5.1
broadcom rabbitmq_server 3.5.2
broadcom rabbitmq_server 3.5.3
broadcom rabbitmq_server 3.5.6
pivotal_software rabbitmq 3.5.4
pivotal_software rabbitmq 3.5.5
pivotal_software rabbitmq 3.5.7
pivotal_software rabbitmq 3.6.0
pivotal_software rabbitmq 3.6.1
pivotal_software rabbitmq 3.6.2
pivotal_software rabbitmq 3.6.3
pivotal_software rabbitmq 3.6.4
pivotal_software rabbitmq 3.6.5
pivotal_software rabbitmq 1.5.0
pivotal_software rabbitmq 1.5.1
pivotal_software rabbitmq 1.5.2
pivotal_software rabbitmq 1.5.3
pivotal_software rabbitmq 1.5.4
pivotal_software rabbitmq 1.5.5
pivotal_software rabbitmq 1.5.6
pivotal_software rabbitmq 1.5.7
pivotal_software rabbitmq 1.5.8
pivotal_software rabbitmq 1.5.9
pivotal_software rabbitmq 1.5.10
pivotal_software rabbitmq 1.5.11
pivotal_software rabbitmq 1.5.12
pivotal_software rabbitmq 1.5.13
pivotal_software rabbitmq 1.5.14
pivotal_software rabbitmq 1.5.15
pivotal_software rabbitmq 1.5.17
pivotal_software rabbitmq 1.5.18
pivotal_software rabbitmq 1.6.0
pivotal_software rabbitmq 1.6.1
pivotal_software rabbitmq 1.6.2
pivotal_software rabbitmq 1.6.3
pivotal_software rabbitmq 1.6.4
pivotal_software rabbitmq 1.6.5
pivotal_software rabbitmq 1.6.6
pivotal_software rabbitmq 1.6.7
pivotal_software rabbitmq 1.6.8
pivotal_software rabbitmq 1.6.9
pivotal_software rabbitmq 1.6.10
pivotal_software rabbitmq 1.7.0
pivotal_software rabbitmq 1.7.2
pivotal_software rabbitmq 1.7.3
pivotal_software rabbitmq 1.7.4
pivotal_software rabbitmq 1.7.5
pivotal_software rabbitmq 1.7.6



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93A123A0-1EDC-4EF6-9300-A265837EC18C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1069E3-5DAE-4B10-A18E-2FB8BE9CF8EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "856A46DD-B7B0-4649-9ADC-6927BDDFC2FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4AA3927-F1D2-472D-A505-5CED02059978",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A465750-6168-4319-866B-D844EB4C88FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D27EDB36-9C20-471D-AFE3-36F62A2C106C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "682BA23A-199F-4591-AD30-EF43B34C227F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D55283F-EA8E-4D12-B49E-D5392242CCF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE08D41D-9782-44B1-A051-EF4BEC861C51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DA0EBB7-35CF-4C57-99E3-F5AA0F09781F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "051E5698-D006-4BE9-9C7E-5E70654CC1E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D29505A-FE4D-4CC2-96EA-13439B1536D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B7EA539-A2AB-4FD4-8CB5-575A594437F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EB3E04F-7C2D-4121-94E6-09C31BA44C37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFAC64E9-0DF2-4350-B2A9-225E841CCF74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8691A77-2BD3-4C6B-97BA-C5904149D9DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B22BC770-52AF-44DD-BEC7-B989B8C08717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1CE91D7-DA1B-4547-B903-A2536E4B3EA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1078BE-B70C-4419-95AC-68ED4AC56EDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "27719DEB-CC36-4DAB-8564-248263F48010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7975F3B-30A9-445B-9D39-8A308670264B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "80944B21-FAC3-49A6-878F-173B5A5AD24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "755456D9-7249-4092-970C-230729E2F856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "74804A09-A266-45F3-BB54-73892AD1D22D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "08DE4A7C-EEA5-46E5-8604-041B721DC3E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "83206370-1606-4D4C-94F2-6B21885ADB6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AA89DA-AE78-409B-B4FF-B743490F76C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "90973C7F-E63D-4C00-BB6A-DA2F796697E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F451B7B3-9272-4184-B18A-87ED6B3D2756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9166D68-CC18-4F53-9DA6-FA10B93E7702",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE205B46-5ACF-44B9-877A-FDC67AA7079F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D0FDB23-6A99-4783-871A-CD25E20F044D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DE6A4B2-0445-470B-B18C-2CFEB2A52455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B52805C-6F10-4BCD-AA74-3E0C0FF5E3C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FE2FBE9-5D35-4273-8B83-A400D3A0136D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11709F3-3F1C-4FC2-9F2D-87951EC04308",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "32F9F3F6-B1AF-423F-9F96-4329589B323A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AECBDFAA-198F-4A47-835A-4E17C090DF02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D879D6FD-39D7-4589-8DE7-C8DAAE6F165E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE842A15-D676-4E00-AAD7-1088CE122876",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F40845F9-00D8-44F0-8B2E-60094A3D37CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "0DA89B77-6455-40CD-931E-BB07CD9A3166",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.1:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "52350E43-4AB5-45ED-AC31-CC948DB87631",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "42856F22-74CD-4278-8EAA-2C6582A7E658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F1C7EE64-A51B-4D02-AAC4-20F4D3FCB110",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B0D8589A-B843-4130-8CC8-3D4C464CDB4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "62016F87-0B15-4D1B-A2AB-FC4769F95DB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "7DF99EF7-AFCB-4CA5-8F28-ABC9118612CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "2D9F3D8B-DDB3-4175-AAD7-8F952E9A7D2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C5125B26-63EE-4FE8-97A1-DC6E11757ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "6AF3BAA0-0AEA-4B96-9C91-E51789844A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "DD5F0850-F34B-4E79-A46D-B74F2E90C43A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.11:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "DF23DD7D-16B4-408C-A825-C79487D79A0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.12:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "E792D92E-07A1-4E48-90CB-5EC7C99E0AF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B873D04B-704B-468D-A2B1-8E04653806F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "13C9004B-590A-45F0-8AA9-713928A8F5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.15:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F22B84B3-438E-4E08-A02D-4A85C0C561B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.17:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "501A5F31-6DBA-4E90-8BAD-E1DFD0967D0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.18:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "3E99B39C-21AF-4F75-8D96-9B69F48C2A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "3C6E80B6-857B-4D53-B107-8667EFCCE0EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.1:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "95C7294C-C9D3-40F8-B3C9-40424D5FC124",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "66F85747-11AA-4133-B553-3C31152F0781",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B425D53C-5713-401E-BE30-BCDE54F65857",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "758D57BA-3EA6-4036-8BDD-5BA2AAE25F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "036437B9-1A7F-4C60-B9FE-B38173BC6FAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "408D457F-4DE5-4280-8379-083DA78ECF00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C9D2B08D-9779-4E80-BAB6-870F81F24F7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "90F47590-6640-494F-8A93-A9AC70459DD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "5D1F88E0-4047-4ADE-A898-88FE6358D659",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "8647C50B-41CB-45CE-89E7-BB4B2759DE40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "9997C9C6-4918-4B74-92E4-012B58278DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F6DB5A36-22F9-4A2C-9ED0-68D1434B06D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "33C0370F-77A5-4A51-ABF2-21793CD57043",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4C3C0A88-66F6-46D5-9A79-BEFB654979D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "1EC26CD6-172D-4DBE-8B23-59491E4765E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "669EA6CA-3F6C-4151-986D-173F1375B32B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.",
      },
      {
         lang: "es",
         value: "Un problema fue descubierto en Pivotal RabbitMQ 3.x en versiones anteriores a 3.5.8 y 3.6.x en versiones anteriores a 3.6.6 y RabbitMQ for PCF 1.5.x en versiones anteriores a 1.5.20, 1.6.x en versiones anteriores a 1.6.12 y 1.7.x en versiones anteriores a 1.7.7. Autenticación de conexión MQTT (MQ Telemetry Transport) con un nombre de usuario/contraseña tiene éxito si se provee un nombre de usuario existente pero la contraseña es omitida de la petición de conexión. Conexiones que usan TLS con un certificado provisto por el cliente no están afectadas.",
      },
   ],
   id: "CVE-2016-9877",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-12-29T09:59:00.790",
   references: [
      {
         source: "security_alert@emc.com",
         url: "http://www.debian.org/security/2017/dsa-3761",
      },
      {
         source: "security_alert@emc.com",
         url: "http://www.securityfocus.com/bid/95065",
      },
      {
         source: "security_alert@emc.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2016-9877",
      },
      {
         source: "security_alert@emc.com",
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2017/dsa-3761",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/95065",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2016-9877",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us",
      },
   ],
   sourceIdentifier: "security_alert@emc.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-11-22 23:15
Modified
2025-04-02 14:13
Summary
Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "006D7A70-6A3E-4B32-9B74-DD5C017E8908",
                     versionEndExcluding: "3.7.20",
                     versionStartIncluding: "3.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A7ACF90-B09B-4A3D-9823-891807C7AC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "71FA6D1D-DDA6-46C0-A865-F44DC00E5208",
                     versionEndExcluding: "1.16.7",
                     versionStartIncluding: "1.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "093C3B60-6AB4-467C-90D9-3B086057D9BA",
                     versionEndExcluding: "1.17.4",
                     versionStartIncluding: "1.17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*",
                     matchCriteriaId: "70108B60-8817-40B4-8412-796A592E4E5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.",
      },
      {
         lang: "es",
         value: "Pivotal RabbitMQ, versiones 3.7 anteriores a v3.7.20 y versiones 3.8 anteriores a v3.8.1, y RabbitMQ para PCF, versiones 1.16.x anteriores a 1.16.7 y versiones 1.17.x anteriores a 1.17.4, contienen dos endpoints, federation y shovel, que no sanean apropiadamente la entrada de usuario. Un usuario malicioso autenticado remoto con acceso administrativo podría crear un ataque de tipo cross site scripting por medio de los campos vhost o node name, lo que podría otorgar acceso a los hosts virtuales e información de administración de políticas.",
      },
   ],
   evaluatorComment: "A remote authenticated malicious user with administrative access",
   id: "CVE-2019-11291",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 3.1,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 0.5,
            impactScore: 2.5,
            source: "security@pivotal.io",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.7,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-22T23:15:11.270",
   references: [
      {
         source: "security@pivotal.io",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0553",
      },
      {
         source: "security@pivotal.io",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2019-11291",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0553",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2019-11291",
      },
   ],
   sourceIdentifier: "security@pivotal.io",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "security@pivotal.io",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2025-04-02 14:13
Summary
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
Impacted products
Vendor Product Version
broadcom rabbitmq_server 3.4.0
broadcom rabbitmq_server 3.4.1
broadcom rabbitmq_server 3.4.2
broadcom rabbitmq_server 3.4.3
broadcom rabbitmq_server 3.4.4
broadcom rabbitmq_server 3.5.0
broadcom rabbitmq_server 3.5.1
broadcom rabbitmq_server 3.5.2
broadcom rabbitmq_server 3.5.3
broadcom rabbitmq_server 3.5.6
broadcom rabbitmq_server 3.6.7
pivotal_software rabbitmq 3.5.4
pivotal_software rabbitmq 3.5.5
pivotal_software rabbitmq 3.5.7
pivotal_software rabbitmq 3.6.0
pivotal_software rabbitmq 3.6.1
pivotal_software rabbitmq 3.6.2
pivotal_software rabbitmq 3.6.3
pivotal_software rabbitmq 3.6.4
pivotal_software rabbitmq 3.6.5
pivotal_software rabbitmq 3.6.6
pivotal_software rabbitmq 1.5.0
pivotal_software rabbitmq 1.5.1
pivotal_software rabbitmq 1.5.2
pivotal_software rabbitmq 1.5.3
pivotal_software rabbitmq 1.5.4
pivotal_software rabbitmq 1.5.5
pivotal_software rabbitmq 1.5.6
pivotal_software rabbitmq 1.5.7
pivotal_software rabbitmq 1.5.8
pivotal_software rabbitmq 1.5.9
pivotal_software rabbitmq 1.5.10
pivotal_software rabbitmq 1.5.11
pivotal_software rabbitmq 1.5.12
pivotal_software rabbitmq 1.5.13
pivotal_software rabbitmq 1.5.14
pivotal_software rabbitmq 1.5.15
pivotal_software rabbitmq 1.5.17
pivotal_software rabbitmq 1.5.18
pivotal_software rabbitmq 1.5.19
pivotal_software rabbitmq 1.6.0
pivotal_software rabbitmq 1.6.1
pivotal_software rabbitmq 1.6.2
pivotal_software rabbitmq 1.6.3
pivotal_software rabbitmq 1.6.4
pivotal_software rabbitmq 1.6.5
pivotal_software rabbitmq 1.6.6
pivotal_software rabbitmq 1.6.7
pivotal_software rabbitmq 1.6.8
pivotal_software rabbitmq 1.6.9
pivotal_software rabbitmq 1.6.10
pivotal_software rabbitmq 1.6.12
pivotal_software rabbitmq 1.6.13
pivotal_software rabbitmq 1.6.14
pivotal_software rabbitmq 1.6.15
pivotal_software rabbitmq 1.6.16
pivotal_software rabbitmq 1.7.0
pivotal_software rabbitmq 1.7.2
pivotal_software rabbitmq 1.7.3
pivotal_software rabbitmq 1.7.4
pivotal_software rabbitmq 1.7.5
pivotal_software rabbitmq 1.7.6
pivotal_software rabbitmq 1.7.7
pivotal_software rabbitmq 1.7.8
pivotal_software rabbitmq 1.7.9
pivotal_software rabbitmq 1.7.10
pivotal_software rabbitmq 1.7.13
pivotal_software rabbitmq 1.7.14
debian debian_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "755456D9-7249-4092-970C-230729E2F856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "74804A09-A266-45F3-BB54-73892AD1D22D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "08DE4A7C-EEA5-46E5-8604-041B721DC3E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "83206370-1606-4D4C-94F2-6B21885ADB6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AA89DA-AE78-409B-B4FF-B743490F76C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "90973C7F-E63D-4C00-BB6A-DA2F796697E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F451B7B3-9272-4184-B18A-87ED6B3D2756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9166D68-CC18-4F53-9DA6-FA10B93E7702",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE205B46-5ACF-44B9-877A-FDC67AA7079F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D0FDB23-6A99-4783-871A-CD25E20F044D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A315D37-F74F-4EF2-9F47-9639BEBEAB05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DE6A4B2-0445-470B-B18C-2CFEB2A52455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B52805C-6F10-4BCD-AA74-3E0C0FF5E3C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FE2FBE9-5D35-4273-8B83-A400D3A0136D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11709F3-3F1C-4FC2-9F2D-87951EC04308",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "32F9F3F6-B1AF-423F-9F96-4329589B323A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AECBDFAA-198F-4A47-835A-4E17C090DF02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D879D6FD-39D7-4589-8DE7-C8DAAE6F165E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE842A15-D676-4E00-AAD7-1088CE122876",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F40845F9-00D8-44F0-8B2E-60094A3D37CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "3772B181-64DB-43AA-99C1-21378CF91E51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "0DA89B77-6455-40CD-931E-BB07CD9A3166",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.1:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "52350E43-4AB5-45ED-AC31-CC948DB87631",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "42856F22-74CD-4278-8EAA-2C6582A7E658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F1C7EE64-A51B-4D02-AAC4-20F4D3FCB110",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B0D8589A-B843-4130-8CC8-3D4C464CDB4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "62016F87-0B15-4D1B-A2AB-FC4769F95DB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "7DF99EF7-AFCB-4CA5-8F28-ABC9118612CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "2D9F3D8B-DDB3-4175-AAD7-8F952E9A7D2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C5125B26-63EE-4FE8-97A1-DC6E11757ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "6AF3BAA0-0AEA-4B96-9C91-E51789844A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "DD5F0850-F34B-4E79-A46D-B74F2E90C43A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.11:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "DF23DD7D-16B4-408C-A825-C79487D79A0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.12:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "E792D92E-07A1-4E48-90CB-5EC7C99E0AF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B873D04B-704B-468D-A2B1-8E04653806F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "13C9004B-590A-45F0-8AA9-713928A8F5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.15:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F22B84B3-438E-4E08-A02D-4A85C0C561B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.17:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "501A5F31-6DBA-4E90-8BAD-E1DFD0967D0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.18:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "3E99B39C-21AF-4F75-8D96-9B69F48C2A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.19:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "0CFACCBF-6C53-4A7F-AC0F-8A2D03E6D6EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "3C6E80B6-857B-4D53-B107-8667EFCCE0EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.1:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "95C7294C-C9D3-40F8-B3C9-40424D5FC124",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "66F85747-11AA-4133-B553-3C31152F0781",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B425D53C-5713-401E-BE30-BCDE54F65857",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "758D57BA-3EA6-4036-8BDD-5BA2AAE25F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "036437B9-1A7F-4C60-B9FE-B38173BC6FAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "408D457F-4DE5-4280-8379-083DA78ECF00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C9D2B08D-9779-4E80-BAB6-870F81F24F7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "90F47590-6640-494F-8A93-A9AC70459DD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "5D1F88E0-4047-4ADE-A898-88FE6358D659",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "8647C50B-41CB-45CE-89E7-BB4B2759DE40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.12:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4960386C-07D9-4367-945C-278595DB6C0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "A49DCDFA-4D98-4AEC-91A1-612B85DDFB04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4FEB47ED-5D35-4151-B087-8324339DE5FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.15:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "65A513AD-9236-42D7-9D04-F318A5815640",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.16:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "6647F298-1B11-46D8-B68A-6B284BB1F7AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "9997C9C6-4918-4B74-92E4-012B58278DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F6DB5A36-22F9-4A2C-9ED0-68D1434B06D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "33C0370F-77A5-4A51-ABF2-21793CD57043",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4C3C0A88-66F6-46D5-9A79-BEFB654979D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "1EC26CD6-172D-4DBE-8B23-59491E4765E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "669EA6CA-3F6C-4151-986D-173F1375B32B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "69960839-7C03-4542-80D3-5C71795F8159",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "82CA3E75-AFD0-486A-9EFA-71A8CA780632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "921374B4-B99F-4863-99D8-9FD938EF8EF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C5344CFC-3100-4407-93E4-65594C3741B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "06B09408-573D-47A8-BC84-724DD88976E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "ADF54631-875A-45C4-9C0A-4836AB1F8309",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en estas versiones de RabbitMQ de Pivotal: todas las versiones 3.4.x, todas las versiones 3.5.x y versiones 3.6.x anteriores a 3.6.9; y en estas versiones de RabbitMQ de Pivotal para PCF: todas las versiones 1.5.x, versiones 1.6.x anteriores a 1.6.18 y versiones 1.7.x anteriores a 1.7.15. La interfaz de usuario de administración de RabbitMQ almacena las credenciales de los usuarios registrados en el almacenamiento local de un navegador sin expiración, lo que hace posible recuperarlas mediante un ataque encadenado.",
      },
   ],
   id: "CVE-2017-4966",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-06-13T06:29:00.503",
   references: [
      {
         source: "security_alert@emc.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
      },
      {
         source: "security_alert@emc.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2017-4966",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2017-4966",
      },
   ],
   sourceIdentifier: "security_alert@emc.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-11-23 00:15
Modified
2025-04-02 14:13
Summary
Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.
References
security@pivotal.iohttps://access.redhat.com/errata/RHSA-2020:0078Third Party Advisory
security@pivotal.iohttps://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20PluginExploit, Third Party Advisory
security@pivotal.iohttps://lists.debian.org/debian-lts-announce/2021/07/msg00011.htmlThird Party Advisory
security@pivotal.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/
security@pivotal.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/
security@pivotal.iohttps://pivotal.io/security/cve-2019-11287Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0078Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20PluginExploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/07/msg00011.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/
af854a3a-2127-422b-91ae-364da2661108https://pivotal.io/security/cve-2019-11287Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1454C45F-9056-4FDB-8E53-BAFDFB330F36",
                     versionEndExcluding: "3.8.1",
                     versionStartIncluding: "3.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:*:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "9A203B97-4B5E-4851-BA2D-DC551F31F3D3",
                     versionEndExcluding: "1.16.7",
                     versionStartIncluding: "1.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:*:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "A17844A1-5E52-4FB6-8261-BF32BA113733",
                     versionEndExcluding: "1.17.4",
                     versionStartIncluding: "1.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44D49187-912D-4F14-A2B4-BEEB9D278C9C",
                     versionEndExcluding: "3.7.21",
                     versionStartIncluding: "3.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                     matchCriteriaId: "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*",
                     matchCriteriaId: "70108B60-8817-40B4-8412-796A592E4E5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The \"X-Reason\" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.",
      },
      {
         lang: "es",
         value: "Pivotal RabbitMQ, versiones 3.7.x anteriores a 3.7.21 y versiones 3.8.x anteriores a 3.8.1, y RabbitMQ para Pivotal Platform, versiones 1.16.x anteriores a 1.16.7 y versiones 1.17.x versiones anteriores a 1.17.4, contienen un plugin de administración web que es vulnerable a un ataque de denegación de servicio. El encabezado \"X-Reason\" de HTTP puede ser aprovechado para insertar una cadena de formato Erlang maliciosa que expandirá y consumirá la pila, resultando en el bloqueo del servidor.",
      },
   ],
   id: "CVE-2019-11287",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 4.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 0.9,
            impactScore: 3.6,
            source: "security@pivotal.io",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-23T00:15:10.683",
   references: [
      {
         source: "security@pivotal.io",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0078",
      },
      {
         source: "security@pivotal.io",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin",
      },
      {
         source: "security@pivotal.io",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
      },
      {
         source: "security@pivotal.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/",
      },
      {
         source: "security@pivotal.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/",
      },
      {
         source: "security@pivotal.io",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2019-11287",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0078",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2019-11287",
      },
   ],
   sourceIdentifier: "security@pivotal.io",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "security@pivotal.io",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-134",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-01-27 20:03
Modified
2025-04-02 14:13
Severity ?
Summary
CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2F0CBEC-F440-45A0-8ED3-59C38B105BCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E1C34F-3CD0-40AD-83F8-4F1B941F0838",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F741941D-F4C9-4F29-ADFF-AC8A4234DFDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DE2226B-850C-48BF-BF22-4061EF8262D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED11458-F118-440F-88BE-E9EEF1231143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82788D-183B-4177-B802-5941EB2390D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D4A89FF-EEA9-4BAF-8F83-D9BCE1617544",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51C91577-54C8-42BD-A5D2-17BBFDC72C0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "48FBD054-FEA5-4550-88CF-02C5DE814198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D97CE3D-526F-4841-B235-03E7C91F60FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5F2EB8D-698A-4937-8272-035792C07E79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE95D715-9F21-446B-8AFA-6B2CB5619DFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A39BD4-AB61-44B9-B5C9-FB6536F69A44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "66E07A00-731E-4F8B-B670-347EB96F6991",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A72AC2-F9A6-4ADF-8930-D39BA92DED89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753E6C4-00C7-4297-8E98-D07BE9E3AF15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2875491-991A-4014-B99C-A042A5D870DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB67C92-9D18-48C5-A6E7-1CBE9F9AD4A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B2AC8B6-9743-4167-AF3A-EAF5D9AE53E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC8A2268-4FA1-405A-9CA6-2522F5AA68CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:2.8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C6F7816-AB21-4D34-A98F-0159737329AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93A123A0-1EDC-4EF6-9300-A265837EC18C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1069E3-5DAE-4B10-A18E-2FB8BE9CF8EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "856A46DD-B7B0-4649-9ADC-6927BDDFC2FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4AA3927-F1D2-472D-A505-5CED02059978",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A465750-6168-4319-866B-D844EB4C88FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D27EDB36-9C20-471D-AFE3-36F62A2C106C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "682BA23A-199F-4591-AD30-EF43B34C227F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D55283F-EA8E-4D12-B49E-D5392242CCF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE08D41D-9782-44B1-A051-EF4BEC861C51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DA0EBB7-35CF-4C57-99E3-F5AA0F09781F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "051E5698-D006-4BE9-9C7E-5E70654CC1E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D29505A-FE4D-4CC2-96EA-13439B1536D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B7EA539-A2AB-4FD4-8CB5-575A594437F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EB3E04F-7C2D-4121-94E6-09C31BA44C37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFAC64E9-0DF2-4350-B2A9-225E841CCF74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8691A77-2BD3-4C6B-97BA-C5904149D9DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B22BC770-52AF-44DD-BEC7-B989B8C08717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1CE91D7-DA1B-4547-B903-A2536E4B3EA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1078BE-B70C-4419-95AC-68ED4AC56EDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "27719DEB-CC36-4DAB-8564-248263F48010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7975F3B-30A9-445B-9D39-8A308670264B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "80944B21-FAC3-49A6-878F-173B5A5AD24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "755456D9-7249-4092-970C-230729E2F856",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de inyección CRLF en el plugin de gestión en RabbitMQ 2.1.0 hasta 3.4.x anterior a 3.4.1 permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y realizar ataques de división de respuestas HTTP a través del parámetro download en api/definitions.",
      },
   ],
   evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/93.html\" target=\"_blank\">CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')</a>",
   id: "CVE-2014-9650",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-01-27T20:03:15.080",
   references: [
      {
         source: "security@ubuntu.com",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.securityfocus.com/bid/76091",
      },
      {
         source: "security@ubuntu.com",
         url: "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/76091",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs",
      },
   ],
   sourceIdentifier: "security@ubuntu.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2025-04-02 14:13
Summary
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
Impacted products
Vendor Product Version
broadcom rabbitmq_server 3.4.0
broadcom rabbitmq_server 3.4.1
broadcom rabbitmq_server 3.4.2
broadcom rabbitmq_server 3.4.3
broadcom rabbitmq_server 3.4.4
broadcom rabbitmq_server 3.5.0
broadcom rabbitmq_server 3.5.1
broadcom rabbitmq_server 3.5.2
broadcom rabbitmq_server 3.5.3
broadcom rabbitmq_server 3.5.6
broadcom rabbitmq_server 3.6.7
pivotal_software rabbitmq 3.5.4
pivotal_software rabbitmq 3.5.5
pivotal_software rabbitmq 3.5.7
pivotal_software rabbitmq 3.6.0
pivotal_software rabbitmq 3.6.1
pivotal_software rabbitmq 3.6.2
pivotal_software rabbitmq 3.6.3
pivotal_software rabbitmq 3.6.4
pivotal_software rabbitmq 3.6.5
pivotal_software rabbitmq 3.6.6
pivotal_software rabbitmq 1.5.0
pivotal_software rabbitmq 1.5.1
pivotal_software rabbitmq 1.5.2
pivotal_software rabbitmq 1.5.3
pivotal_software rabbitmq 1.5.4
pivotal_software rabbitmq 1.5.5
pivotal_software rabbitmq 1.5.6
pivotal_software rabbitmq 1.5.7
pivotal_software rabbitmq 1.5.8
pivotal_software rabbitmq 1.5.9
pivotal_software rabbitmq 1.5.10
pivotal_software rabbitmq 1.5.11
pivotal_software rabbitmq 1.5.12
pivotal_software rabbitmq 1.5.13
pivotal_software rabbitmq 1.5.14
pivotal_software rabbitmq 1.5.15
pivotal_software rabbitmq 1.5.17
pivotal_software rabbitmq 1.5.18
pivotal_software rabbitmq 1.5.19
pivotal_software rabbitmq 1.6.0
pivotal_software rabbitmq 1.6.1
pivotal_software rabbitmq 1.6.2
pivotal_software rabbitmq 1.6.3
pivotal_software rabbitmq 1.6.4
pivotal_software rabbitmq 1.6.5
pivotal_software rabbitmq 1.6.6
pivotal_software rabbitmq 1.6.7
pivotal_software rabbitmq 1.6.8
pivotal_software rabbitmq 1.6.9
pivotal_software rabbitmq 1.6.10
pivotal_software rabbitmq 1.6.12
pivotal_software rabbitmq 1.6.13
pivotal_software rabbitmq 1.6.14
pivotal_software rabbitmq 1.6.15
pivotal_software rabbitmq 1.6.16
pivotal_software rabbitmq 1.7.0
pivotal_software rabbitmq 1.7.2
pivotal_software rabbitmq 1.7.3
pivotal_software rabbitmq 1.7.4
pivotal_software rabbitmq 1.7.5
pivotal_software rabbitmq 1.7.6
pivotal_software rabbitmq 1.7.7
pivotal_software rabbitmq 1.7.8
pivotal_software rabbitmq 1.7.9
pivotal_software rabbitmq 1.7.10
pivotal_software rabbitmq 1.7.13
pivotal_software rabbitmq 1.7.14
debian debian_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "755456D9-7249-4092-970C-230729E2F856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "74804A09-A266-45F3-BB54-73892AD1D22D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "08DE4A7C-EEA5-46E5-8604-041B721DC3E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "83206370-1606-4D4C-94F2-6B21885ADB6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AA89DA-AE78-409B-B4FF-B743490F76C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "90973C7F-E63D-4C00-BB6A-DA2F796697E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F451B7B3-9272-4184-B18A-87ED6B3D2756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9166D68-CC18-4F53-9DA6-FA10B93E7702",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE205B46-5ACF-44B9-877A-FDC67AA7079F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D0FDB23-6A99-4783-871A-CD25E20F044D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A315D37-F74F-4EF2-9F47-9639BEBEAB05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DE6A4B2-0445-470B-B18C-2CFEB2A52455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B52805C-6F10-4BCD-AA74-3E0C0FF5E3C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FE2FBE9-5D35-4273-8B83-A400D3A0136D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11709F3-3F1C-4FC2-9F2D-87951EC04308",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "32F9F3F6-B1AF-423F-9F96-4329589B323A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AECBDFAA-198F-4A47-835A-4E17C090DF02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D879D6FD-39D7-4589-8DE7-C8DAAE6F165E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE842A15-D676-4E00-AAD7-1088CE122876",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F40845F9-00D8-44F0-8B2E-60094A3D37CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "3772B181-64DB-43AA-99C1-21378CF91E51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "0DA89B77-6455-40CD-931E-BB07CD9A3166",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.1:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "52350E43-4AB5-45ED-AC31-CC948DB87631",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "42856F22-74CD-4278-8EAA-2C6582A7E658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F1C7EE64-A51B-4D02-AAC4-20F4D3FCB110",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B0D8589A-B843-4130-8CC8-3D4C464CDB4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "62016F87-0B15-4D1B-A2AB-FC4769F95DB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "7DF99EF7-AFCB-4CA5-8F28-ABC9118612CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "2D9F3D8B-DDB3-4175-AAD7-8F952E9A7D2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C5125B26-63EE-4FE8-97A1-DC6E11757ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "6AF3BAA0-0AEA-4B96-9C91-E51789844A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "DD5F0850-F34B-4E79-A46D-B74F2E90C43A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.11:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "DF23DD7D-16B4-408C-A825-C79487D79A0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.12:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "E792D92E-07A1-4E48-90CB-5EC7C99E0AF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B873D04B-704B-468D-A2B1-8E04653806F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "13C9004B-590A-45F0-8AA9-713928A8F5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.15:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F22B84B3-438E-4E08-A02D-4A85C0C561B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.17:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "501A5F31-6DBA-4E90-8BAD-E1DFD0967D0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.18:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "3E99B39C-21AF-4F75-8D96-9B69F48C2A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.19:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "0CFACCBF-6C53-4A7F-AC0F-8A2D03E6D6EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "3C6E80B6-857B-4D53-B107-8667EFCCE0EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.1:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "95C7294C-C9D3-40F8-B3C9-40424D5FC124",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "66F85747-11AA-4133-B553-3C31152F0781",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B425D53C-5713-401E-BE30-BCDE54F65857",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "758D57BA-3EA6-4036-8BDD-5BA2AAE25F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "036437B9-1A7F-4C60-B9FE-B38173BC6FAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "408D457F-4DE5-4280-8379-083DA78ECF00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C9D2B08D-9779-4E80-BAB6-870F81F24F7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "90F47590-6640-494F-8A93-A9AC70459DD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "5D1F88E0-4047-4ADE-A898-88FE6358D659",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "8647C50B-41CB-45CE-89E7-BB4B2759DE40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.12:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4960386C-07D9-4367-945C-278595DB6C0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "A49DCDFA-4D98-4AEC-91A1-612B85DDFB04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4FEB47ED-5D35-4151-B087-8324339DE5FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.15:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "65A513AD-9236-42D7-9D04-F318A5815640",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.16:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "6647F298-1B11-46D8-B68A-6B284BB1F7AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "9997C9C6-4918-4B74-92E4-012B58278DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F6DB5A36-22F9-4A2C-9ED0-68D1434B06D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "33C0370F-77A5-4A51-ABF2-21793CD57043",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4C3C0A88-66F6-46D5-9A79-BEFB654979D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "1EC26CD6-172D-4DBE-8B23-59491E4765E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "669EA6CA-3F6C-4151-986D-173F1375B32B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "69960839-7C03-4542-80D3-5C71795F8159",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "82CA3E75-AFD0-486A-9EFA-71A8CA780632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "921374B4-B99F-4863-99D8-9FD938EF8EF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C5344CFC-3100-4407-93E4-65594C3741B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "06B09408-573D-47A8-BC84-724DD88976E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "ADF54631-875A-45C4-9C0A-4836AB1F8309",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en estas versiones de RabbitMQ de Pivotal: todas las versiones 3.4.x, todas las versiones 3.5.x y versiones 3.6.x anteriores a 3.6.9; y en estas versiones de RabbitMQ de Pivotal para PCF: todas las versiones 1.5.x, versiones 1.6.x anteriores a 1.6.18 y versiones 1.7.x anteriores a 1.7.15. Varios formularios en la interfaz de usuario de administración de RabbitMQ son vulnerables a los ataques de tipo XSS.",
      },
   ],
   id: "CVE-2017-4965",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-06-13T06:29:00.457",
   references: [
      {
         source: "security_alert@emc.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/98394",
      },
      {
         source: "security_alert@emc.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
      },
      {
         source: "security_alert@emc.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2017-4965",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/98394",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2017-4965",
      },
   ],
   sourceIdentifier: "security_alert@emc.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2025-04-02 14:13
Summary
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
Impacted products
Vendor Product Version
broadcom rabbitmq_server 3.4.0
broadcom rabbitmq_server 3.4.1
broadcom rabbitmq_server 3.4.2
broadcom rabbitmq_server 3.4.3
broadcom rabbitmq_server 3.4.4
broadcom rabbitmq_server 3.5.0
broadcom rabbitmq_server 3.5.1
broadcom rabbitmq_server 3.5.2
broadcom rabbitmq_server 3.5.3
broadcom rabbitmq_server 3.5.6
broadcom rabbitmq_server 3.6.7
pivotal_software rabbitmq 3.5.4
pivotal_software rabbitmq 3.5.5
pivotal_software rabbitmq 3.5.7
pivotal_software rabbitmq 3.6.0
pivotal_software rabbitmq 3.6.1
pivotal_software rabbitmq 3.6.2
pivotal_software rabbitmq 3.6.3
pivotal_software rabbitmq 3.6.4
pivotal_software rabbitmq 3.6.5
pivotal_software rabbitmq 3.6.6
pivotal_software rabbitmq 1.5.0
pivotal_software rabbitmq 1.5.1
pivotal_software rabbitmq 1.5.2
pivotal_software rabbitmq 1.5.3
pivotal_software rabbitmq 1.5.4
pivotal_software rabbitmq 1.5.5
pivotal_software rabbitmq 1.5.6
pivotal_software rabbitmq 1.5.7
pivotal_software rabbitmq 1.5.8
pivotal_software rabbitmq 1.5.9
pivotal_software rabbitmq 1.5.10
pivotal_software rabbitmq 1.5.11
pivotal_software rabbitmq 1.5.12
pivotal_software rabbitmq 1.5.13
pivotal_software rabbitmq 1.5.14
pivotal_software rabbitmq 1.5.15
pivotal_software rabbitmq 1.5.17
pivotal_software rabbitmq 1.5.18
pivotal_software rabbitmq 1.5.19
pivotal_software rabbitmq 1.6.0
pivotal_software rabbitmq 1.6.1
pivotal_software rabbitmq 1.6.2
pivotal_software rabbitmq 1.6.3
pivotal_software rabbitmq 1.6.4
pivotal_software rabbitmq 1.6.5
pivotal_software rabbitmq 1.6.6
pivotal_software rabbitmq 1.6.7
pivotal_software rabbitmq 1.6.8
pivotal_software rabbitmq 1.6.9
pivotal_software rabbitmq 1.6.10
pivotal_software rabbitmq 1.6.12
pivotal_software rabbitmq 1.6.13
pivotal_software rabbitmq 1.6.14
pivotal_software rabbitmq 1.6.15
pivotal_software rabbitmq 1.6.16
pivotal_software rabbitmq 1.7.0
pivotal_software rabbitmq 1.7.2
pivotal_software rabbitmq 1.7.3
pivotal_software rabbitmq 1.7.4
pivotal_software rabbitmq 1.7.5
pivotal_software rabbitmq 1.7.6
pivotal_software rabbitmq 1.7.7
pivotal_software rabbitmq 1.7.8
pivotal_software rabbitmq 1.7.9
pivotal_software rabbitmq 1.7.10
pivotal_software rabbitmq 1.7.13
pivotal_software rabbitmq 1.7.14
debian debian_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "755456D9-7249-4092-970C-230729E2F856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "74804A09-A266-45F3-BB54-73892AD1D22D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "08DE4A7C-EEA5-46E5-8604-041B721DC3E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "83206370-1606-4D4C-94F2-6B21885ADB6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AA89DA-AE78-409B-B4FF-B743490F76C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "90973C7F-E63D-4C00-BB6A-DA2F796697E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F451B7B3-9272-4184-B18A-87ED6B3D2756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9166D68-CC18-4F53-9DA6-FA10B93E7702",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE205B46-5ACF-44B9-877A-FDC67AA7079F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D0FDB23-6A99-4783-871A-CD25E20F044D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:3.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A315D37-F74F-4EF2-9F47-9639BEBEAB05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DE6A4B2-0445-470B-B18C-2CFEB2A52455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B52805C-6F10-4BCD-AA74-3E0C0FF5E3C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FE2FBE9-5D35-4273-8B83-A400D3A0136D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11709F3-3F1C-4FC2-9F2D-87951EC04308",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "32F9F3F6-B1AF-423F-9F96-4329589B323A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AECBDFAA-198F-4A47-835A-4E17C090DF02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D879D6FD-39D7-4589-8DE7-C8DAAE6F165E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE842A15-D676-4E00-AAD7-1088CE122876",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F40845F9-00D8-44F0-8B2E-60094A3D37CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:3.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "3772B181-64DB-43AA-99C1-21378CF91E51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "0DA89B77-6455-40CD-931E-BB07CD9A3166",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.1:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "52350E43-4AB5-45ED-AC31-CC948DB87631",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "42856F22-74CD-4278-8EAA-2C6582A7E658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F1C7EE64-A51B-4D02-AAC4-20F4D3FCB110",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B0D8589A-B843-4130-8CC8-3D4C464CDB4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "62016F87-0B15-4D1B-A2AB-FC4769F95DB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "7DF99EF7-AFCB-4CA5-8F28-ABC9118612CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "2D9F3D8B-DDB3-4175-AAD7-8F952E9A7D2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C5125B26-63EE-4FE8-97A1-DC6E11757ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "6AF3BAA0-0AEA-4B96-9C91-E51789844A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "DD5F0850-F34B-4E79-A46D-B74F2E90C43A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.11:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "DF23DD7D-16B4-408C-A825-C79487D79A0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.12:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "E792D92E-07A1-4E48-90CB-5EC7C99E0AF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B873D04B-704B-468D-A2B1-8E04653806F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "13C9004B-590A-45F0-8AA9-713928A8F5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.15:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F22B84B3-438E-4E08-A02D-4A85C0C561B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.17:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "501A5F31-6DBA-4E90-8BAD-E1DFD0967D0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.18:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "3E99B39C-21AF-4F75-8D96-9B69F48C2A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.5.19:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "0CFACCBF-6C53-4A7F-AC0F-8A2D03E6D6EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "3C6E80B6-857B-4D53-B107-8667EFCCE0EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.1:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "95C7294C-C9D3-40F8-B3C9-40424D5FC124",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "66F85747-11AA-4133-B553-3C31152F0781",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "B425D53C-5713-401E-BE30-BCDE54F65857",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "758D57BA-3EA6-4036-8BDD-5BA2AAE25F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "036437B9-1A7F-4C60-B9FE-B38173BC6FAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "408D457F-4DE5-4280-8379-083DA78ECF00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C9D2B08D-9779-4E80-BAB6-870F81F24F7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "90F47590-6640-494F-8A93-A9AC70459DD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "5D1F88E0-4047-4ADE-A898-88FE6358D659",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "8647C50B-41CB-45CE-89E7-BB4B2759DE40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.12:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4960386C-07D9-4367-945C-278595DB6C0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "A49DCDFA-4D98-4AEC-91A1-612B85DDFB04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4FEB47ED-5D35-4151-B087-8324339DE5FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.15:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "65A513AD-9236-42D7-9D04-F318A5815640",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.6.16:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "6647F298-1B11-46D8-B68A-6B284BB1F7AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.0:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "9997C9C6-4918-4B74-92E4-012B58278DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.2:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "F6DB5A36-22F9-4A2C-9ED0-68D1434B06D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.3:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "33C0370F-77A5-4A51-ABF2-21793CD57043",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.4:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "4C3C0A88-66F6-46D5-9A79-BEFB654979D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.5:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "1EC26CD6-172D-4DBE-8B23-59491E4765E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.6:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "669EA6CA-3F6C-4151-986D-173F1375B32B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.7:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "69960839-7C03-4542-80D3-5C71795F8159",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.8:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "82CA3E75-AFD0-486A-9EFA-71A8CA780632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.9:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "921374B4-B99F-4863-99D8-9FD938EF8EF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.10:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "C5344CFC-3100-4407-93E4-65594C3741B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.13:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "06B09408-573D-47A8-BC84-724DD88976E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:1.7.14:*:*:*:*:pivotal_cloud_foundry:*:*",
                     matchCriteriaId: "ADF54631-875A-45C4-9C0A-4836AB1F8309",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en estas versiones de RabbitMQ de Pivotal: todas las versiones 3.4.x, todas las versiones 3.5.x y versiones 3.6.x anteriores a 3.6.9; y en estas versiones de RabbitMQ de Pivotal para PCF: todas las versiones 1.5.x, versiones 1.6.x anteriores a 1.6.18 y versiones 1.7.x anteriores a 1.7.15. Varios formularios en la interfaz de usuario de administración de RabbitMQ son vulnerables a los ataques de tipo XSS.",
      },
   ],
   id: "CVE-2017-4967",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-06-13T06:29:00.520",
   references: [
      {
         source: "security_alert@emc.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
      },
      {
         source: "security_alert@emc.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2017-4965",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://pivotal.io/security/cve-2017-4965",
      },
   ],
   sourceIdentifier: "security_alert@emc.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-05-18 13:15
Modified
2025-04-02 14:13
Summary
RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.
Impacted products
Vendor Product Version
broadcom rabbitmq_server *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "16BCC6EF-2A22-4DEF-B1AE-3F307CFD404F",
                     versionEndExcluding: "3.8.16",
                     versionStartIncluding: "3.8.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.",
      },
      {
         lang: "es",
         value: "Los instaladores de RabbitMQ en Windows anterior a versión 3.8.16, no endurecen los permisos de los directorios de los plugins, permitiendo potencialmente a atacantes con suficientes permisos del sistema de archivos local añadir plugins arbitrarios",
      },
   ],
   id: "CVE-2021-22117",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-05-18T13:15:07.597",
   references: [
      {
         source: "security@vmware.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://tanzu.vmware.com/security/cve-2021-22117",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://tanzu.vmware.com/security/cve-2021-22117",
      },
   ],
   sourceIdentifier: "security@vmware.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "security@vmware.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-08-31 15:15
Modified
2025-04-02 14:13
Summary
RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
Impacted products
Vendor Product Version
broadcom rabbitmq_server *
pivotal_software rabbitmq *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3294509D-9AD8-4BA0-B2B5-A61A3C59BB5D",
                     versionEndExcluding: "3.8.7",
                     versionStartIncluding: "3.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pivotal_software:rabbitmq:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56069EBC-2F93-4786-9AE2-841A659FD9C0",
                     versionEndExcluding: "3.7.28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.",
      },
      {
         lang: "es",
         value: "RabbitMQ versiones 3.8.x anteriores a 3.8.7, son propensas a una vulnerabilidad de seguridad de plantación de binario específico de Windows que permite una ejecución de código arbitraria. Un atacante con privilegios de escritura en el directorio de instalación de RabbitMQ y acceso local en Windows podría llevar a cabo un ataque de secuestro (plantación) de binario local y ejecutar código arbitrario",
      },
   ],
   id: "CVE-2020-5419",
   lastModified: "2025-04-02T14:13:43.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "security@pivotal.io",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-08-31T15:15:11.010",
   references: [
      {
         source: "security@pivotal.io",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://tanzu.vmware.com/security/cve-2020-5419",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://tanzu.vmware.com/security/cve-2020-5419",
      },
   ],
   sourceIdentifier: "security@pivotal.io",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "security@pivotal.io",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2017-4965
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 14:47
Severity ?
Summary
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
References
Impacted products
Vendor Product Version
n/a Pivotal RabbitMQ Version: Pivotal RabbitMQ
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T14:47:43.344Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "98394",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/98394",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://pivotal.io/security/cve-2017-4965",
               },
               {
                  name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Pivotal RabbitMQ",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Pivotal RabbitMQ",
                  },
               ],
            },
         ],
         datePublic: "2017-06-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "XSS vulnerabilities in RabbitMQ management UI",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-07-19T19:06:16",
            orgId: "c550e75a-17ff-4988-97f0-544cde3820fe",
            shortName: "dell",
         },
         references: [
            {
               name: "98394",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/98394",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://pivotal.io/security/cve-2017-4965",
            },
            {
               name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@dell.com",
               ID: "CVE-2017-4965",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Pivotal RabbitMQ",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Pivotal RabbitMQ",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "XSS vulnerabilities in RabbitMQ management UI",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "98394",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/98394",
                  },
                  {
                     name: "https://pivotal.io/security/cve-2017-4965",
                     refsource: "CONFIRM",
                     url: "https://pivotal.io/security/cve-2017-4965",
                  },
                  {
                     name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "c550e75a-17ff-4988-97f0-544cde3820fe",
      assignerShortName: "dell",
      cveId: "CVE-2017-4965",
      datePublished: "2017-06-13T06:00:00",
      dateReserved: "2016-12-29T00:00:00",
      dateUpdated: "2024-08-05T14:47:43.344Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-4967
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 14:47
Severity ?
Summary
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
References
Impacted products
Vendor Product Version
n/a Pivotal RabbitMQ Version: Pivotal RabbitMQ
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T14:47:43.349Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://pivotal.io/security/cve-2017-4965",
               },
               {
                  name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Pivotal RabbitMQ",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Pivotal RabbitMQ",
                  },
               ],
            },
         ],
         datePublic: "2017-06-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "XSS vulnerabilities in RabbitMQ management UI",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-07-19T19:06:14",
            orgId: "c550e75a-17ff-4988-97f0-544cde3820fe",
            shortName: "dell",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://pivotal.io/security/cve-2017-4965",
            },
            {
               name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@dell.com",
               ID: "CVE-2017-4967",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Pivotal RabbitMQ",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Pivotal RabbitMQ",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "XSS vulnerabilities in RabbitMQ management UI",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://pivotal.io/security/cve-2017-4965",
                     refsource: "CONFIRM",
                     url: "https://pivotal.io/security/cve-2017-4965",
                  },
                  {
                     name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "c550e75a-17ff-4988-97f0-544cde3820fe",
      assignerShortName: "dell",
      cveId: "CVE-2017-4967",
      datePublished: "2017-06-13T06:00:00",
      dateReserved: "2016-12-29T00:00:00",
      dateUpdated: "2024-08-05T14:47:43.349Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-31008
Vulnerability from cvelistv5
Published
2022-10-06 00:00
Modified
2024-08-03 07:03
Summary
RabbitMQ is a multi-protocol messaging and streaming broker. In affected versions the shovel and federation plugins perform URI obfuscation in their worker (link) state. The encryption key used to encrypt the URI was seeded with a predictable secret. This means that in case of certain exceptions related to Shovel and Federation plugins, reasonably easily deobfuscatable data could appear in the node log. Patched versions correctly use a cluster-wide secret for that purpose. This issue has been addressed and Patched versions: `3.10.2`, `3.9.18`, `3.8.32` are available. Users unable to upgrade should disable the Shovel and Federation plugins.
Impacted products
Vendor Product Version
rabbitmq rabbitmq-server Version: < 3.8.32
Version: >= 3.9.0, < 3.9.18
Version: >= 3.10.0, < 3.10.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T07:03:40.269Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-v9gv-xp36-jgj8",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/rabbitmq/rabbitmq-server/pull/4841",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "rabbitmq-server",
               vendor: "rabbitmq",
               versions: [
                  {
                     status: "affected",
                     version: "< 3.8.32",
                  },
                  {
                     status: "affected",
                     version: ">= 3.9.0, < 3.9.18",
                  },
                  {
                     status: "affected",
                     version: ">= 3.10.0, < 3.10.2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "RabbitMQ is a multi-protocol messaging and streaming broker. In affected versions the shovel and federation plugins perform URI obfuscation in their worker (link) state. The encryption key used to encrypt the URI was seeded with a predictable secret. This means that in case of certain exceptions related to Shovel and Federation plugins, reasonably easily deobfuscatable data could appear in the node log. Patched versions correctly use a cluster-wide secret for that purpose. This issue has been addressed and Patched versions: `3.10.2`, `3.9.18`, `3.8.32` are available. Users unable to upgrade should disable the Shovel and Federation plugins.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-330",
                     description: "CWE-330: Use of Insufficiently Random Values",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-11T00:00:00",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               url: "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-v9gv-xp36-jgj8",
            },
            {
               url: "https://github.com/rabbitmq/rabbitmq-server/pull/4841",
            },
         ],
         source: {
            advisory: "GHSA-v9gv-xp36-jgj8",
            discovery: "UNKNOWN",
         },
         title: "Predictable credential obfuscation seed value used in rabbitmq-server",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2022-31008",
      datePublished: "2022-10-06T00:00:00",
      dateReserved: "2022-05-18T00:00:00",
      dateUpdated: "2024-08-03T07:03:40.269Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-4966
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 14:47
Severity ?
Summary
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
References
Impacted products
Vendor Product Version
n/a Pivotal RabbitMQ Version: Pivotal RabbitMQ
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T14:47:44.070Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://pivotal.io/security/cve-2017-4966",
               },
               {
                  name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Pivotal RabbitMQ",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Pivotal RabbitMQ",
                  },
               ],
            },
         ],
         datePublic: "2017-06-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "local storage of credentials",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-07-19T19:06:22",
            orgId: "c550e75a-17ff-4988-97f0-544cde3820fe",
            shortName: "dell",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://pivotal.io/security/cve-2017-4966",
            },
            {
               name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@dell.com",
               ID: "CVE-2017-4966",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Pivotal RabbitMQ",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Pivotal RabbitMQ",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "local storage of credentials",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://pivotal.io/security/cve-2017-4966",
                     refsource: "CONFIRM",
                     url: "https://pivotal.io/security/cve-2017-4966",
                  },
                  {
                     name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "c550e75a-17ff-4988-97f0-544cde3820fe",
      assignerShortName: "dell",
      cveId: "CVE-2017-4966",
      datePublished: "2017-06-13T06:00:00",
      dateReserved: "2016-12-29T00:00:00",
      dateUpdated: "2024-08-05T14:47:44.070Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11287
Vulnerability from cvelistv5
Published
2019-11-22 23:26
Modified
2024-09-16 22:24
Summary
Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.
Impacted products
Vendor Product Version
Pivotal RabbitMQ for Pivotal Platform Version: 1.16   < 1.16.7
Version: 1.17   < 1.17.4
Create a notification for this product.
   Pivotal RabbitMQ Version: 3.7   < v3.7.21
Version: 3.8   < v3.8.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:09.092Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://pivotal.io/security/cve-2019-11287",
               },
               {
                  name: "FEDORA-2019-6497f51791",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/",
               },
               {
                  name: "FEDORA-2019-74d2feb5be",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/",
               },
               {
                  name: "RHSA-2020:0078",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0078",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin",
               },
               {
                  name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "RabbitMQ for Pivotal Platform",
               vendor: "Pivotal",
               versions: [
                  {
                     lessThan: "1.16.7",
                     status: "affected",
                     version: "1.16",
                     versionType: "custom",
                  },
                  {
                     lessThan: "1.17.4",
                     status: "affected",
                     version: "1.17",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "RabbitMQ",
               vendor: "Pivotal",
               versions: [
                  {
                     lessThan: "v3.7.21",
                     status: "affected",
                     version: "3.7",
                     versionType: "custom",
                  },
                  {
                     lessThan: "v3.8.1",
                     status: "affected",
                     version: "3.8",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-11-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The \"X-Reason\" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 4.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400: Denial of Service",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-07-19T19:06:18",
            orgId: "862b2186-222f-48b9-af87-f1fb7bb26d03",
            shortName: "pivotal",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://pivotal.io/security/cve-2019-11287",
            },
            {
               name: "FEDORA-2019-6497f51791",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/",
            },
            {
               name: "FEDORA-2019-74d2feb5be",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/",
            },
            {
               name: "RHSA-2020:0078",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0078",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin",
            },
            {
               name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "RabbitMQ Web Management Plugin DoS via heap overflow",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@pivotal.io",
               DATE_PUBLIC: "2019-11-22T20:51:56.000Z",
               ID: "CVE-2019-11287",
               STATE: "PUBLIC",
               TITLE: "RabbitMQ Web Management Plugin DoS via heap overflow",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "RabbitMQ for Pivotal Platform",
                                 version: {
                                    version_data: [
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "1.16",
                                          version_value: "1.16.7",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "1.17",
                                          version_value: "1.17.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "RabbitMQ",
                                 version: {
                                    version_data: [
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "3.7",
                                          version_value: "v3.7.21",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "3.8",
                                          version_value: "v3.8.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Pivotal",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The \"X-Reason\" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 4.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-400: Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://pivotal.io/security/cve-2019-11287",
                     refsource: "CONFIRM",
                     url: "https://pivotal.io/security/cve-2019-11287",
                  },
                  {
                     name: "FEDORA-2019-6497f51791",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/",
                  },
                  {
                     name: "FEDORA-2019-74d2feb5be",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/",
                  },
                  {
                     name: "RHSA-2020:0078",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0078",
                  },
                  {
                     name: "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin",
                     refsource: "MISC",
                     url: "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin",
                  },
                  {
                     name: "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html",
                  },
               ],
            },
            source: {
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "862b2186-222f-48b9-af87-f1fb7bb26d03",
      assignerShortName: "pivotal",
      cveId: "CVE-2019-11287",
      datePublished: "2019-11-22T23:26:08.880149Z",
      dateReserved: "2019-04-18T00:00:00",
      dateUpdated: "2024-09-16T22:24:51.121Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-9650
Vulnerability from cvelistv5
Published
2015-01-27 17:00
Modified
2024-08-06 13:47
Severity ?
Summary
CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:47:41.815Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2016:0308",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
               },
               {
                  name: "76091",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76091",
               },
               {
                  name: "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-10-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-01T15:57:02",
            orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
            shortName: "canonical",
         },
         references: [
            {
               name: "RHSA-2016:0308",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
            },
            {
               name: "76091",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76091",
            },
            {
               name: "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@ubuntu.com",
               ID: "CVE-2014-9650",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2016:0308",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs",
                     refsource: "CONFIRM",
                     url: "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs",
                  },
                  {
                     name: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
                     refsource: "CONFIRM",
                     url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
                  },
                  {
                     name: "76091",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76091",
                  },
                  {
                     name: "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
      assignerShortName: "canonical",
      cveId: "CVE-2014-9650",
      datePublished: "2015-01-27T17:00:00",
      dateReserved: "2015-01-27T00:00:00",
      dateUpdated: "2024-08-06T13:47:41.815Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-9877
Vulnerability from cvelistv5
Published
2016-12-29 09:02
Modified
2024-08-06 03:07
Severity ?
Summary
An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
Impacted products
Vendor Product Version
n/a Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6; RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12 and 1.7.x before 1.7.7 Version: Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6; RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12 and 1.7.x before 1.7.7
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T03:07:30.822Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us",
               },
               {
                  name: "95065",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/95065",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://pivotal.io/security/cve-2016-9877",
               },
               {
                  name: "DSA-3761",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2017/dsa-3761",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6; RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12 and 1.7.x before 1.7.7",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6; RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12 and 1.7.x before 1.7.7",
                  },
               ],
            },
         ],
         datePublic: "2016-12-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RabbitMQ authentication vulnerability",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-09-21T09:57:01",
            orgId: "c550e75a-17ff-4988-97f0-544cde3820fe",
            shortName: "dell",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us",
            },
            {
               name: "95065",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/95065",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://pivotal.io/security/cve-2016-9877",
            },
            {
               name: "DSA-3761",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2017/dsa-3761",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security_alert@emc.com",
               ID: "CVE-2016-9877",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6; RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12 and 1.7.x before 1.7.7",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6; RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12 and 1.7.x before 1.7.7",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "RabbitMQ authentication vulnerability",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us",
                  },
                  {
                     name: "95065",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/95065",
                  },
                  {
                     name: "https://pivotal.io/security/cve-2016-9877",
                     refsource: "CONFIRM",
                     url: "https://pivotal.io/security/cve-2016-9877",
                  },
                  {
                     name: "DSA-3761",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2017/dsa-3761",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "c550e75a-17ff-4988-97f0-544cde3820fe",
      assignerShortName: "dell",
      cveId: "CVE-2016-9877",
      datePublished: "2016-12-29T09:02:00",
      dateReserved: "2016-12-06T00:00:00",
      dateUpdated: "2024-08-06T03:07:30.822Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-5419
Vulnerability from cvelistv5
Published
2020-08-31 15:05
Modified
2024-09-16 23:31
Summary
RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
References
https://tanzu.vmware.com/security/cve-2020-5419x_refsource_CONFIRM
Impacted products
Vendor Product Version
VMware Tanzu RabbitMQ Version: 3.7   < 3.7.28
Version: 3.8   < 3.8.7
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:30:24.433Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://tanzu.vmware.com/security/cve-2020-5419",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "RabbitMQ",
               vendor: "VMware Tanzu",
               versions: [
                  {
                     lessThan: "3.7.28",
                     status: "affected",
                     version: "3.7",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.8.7",
                     status: "affected",
                     version: "3.8",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2020-08-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-427",
                     description: "CWE-427: Uncontrolled Search Path Element",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-08-31T15:05:19",
            orgId: "862b2186-222f-48b9-af87-f1fb7bb26d03",
            shortName: "pivotal",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://tanzu.vmware.com/security/cve-2020-5419",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "RabbitMQ arbitrary code execution using local binary planting",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@pivotal.io",
               DATE_PUBLIC: "2020-08-27T00:00:00.000Z",
               ID: "CVE-2020-5419",
               STATE: "PUBLIC",
               TITLE: "RabbitMQ arbitrary code execution using local binary planting",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "RabbitMQ",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "3.7",
                                          version_value: "3.7.28",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "3.8",
                                          version_value: "3.8.7",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "VMware Tanzu",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-427: Uncontrolled Search Path Element",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://tanzu.vmware.com/security/cve-2020-5419",
                     refsource: "CONFIRM",
                     url: "https://tanzu.vmware.com/security/cve-2020-5419",
                  },
               ],
            },
            source: {
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "862b2186-222f-48b9-af87-f1fb7bb26d03",
      assignerShortName: "pivotal",
      cveId: "CVE-2020-5419",
      datePublished: "2020-08-31T15:05:20.057877Z",
      dateReserved: "2020-01-03T00:00:00",
      dateUpdated: "2024-09-16T23:31:18.810Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11291
Vulnerability from cvelistv5
Published
2019-11-22 22:56
Modified
2024-09-17 00:31
Summary
Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.
References
https://pivotal.io/security/cve-2019-11291x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2020:0553vendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
Pivotal RabbitMQ Version: 3.8   < v3.8.1
Version: 3.7   < v3.7.20
Create a notification for this product.
   Pivotal RabbitMQ for Pivotal Platform Version: 1.17   < 1.17.4
Version: 1.16   < 1.16.7
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:09.290Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://pivotal.io/security/cve-2019-11291",
               },
               {
                  name: "RHSA-2020:0553",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0553",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "RabbitMQ",
               vendor: "Pivotal",
               versions: [
                  {
                     lessThan: "v3.8.1",
                     status: "affected",
                     version: "3.8",
                     versionType: "custom",
                  },
                  {
                     lessThan: "v3.7.20",
                     status: "affected",
                     version: "3.7",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "RabbitMQ for Pivotal Platform",
               vendor: "Pivotal",
               versions: [
                  {
                     lessThan: "1.17.4",
                     status: "affected",
                     version: "1.17",
                     versionType: "custom",
                  },
                  {
                     lessThan: "1.16.7",
                     status: "affected",
                     version: "1.16",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-11-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 3.1,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79: Cross-site Scripting (XSS) - Generic",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-19T18:06:05",
            orgId: "862b2186-222f-48b9-af87-f1fb7bb26d03",
            shortName: "pivotal",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://pivotal.io/security/cve-2019-11291",
            },
            {
               name: "RHSA-2020:0553",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0553",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "RabbitMQ XSS attack via federation and shovel endpoints",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@pivotal.io",
               DATE_PUBLIC: "2019-11-22T20:37:00.000Z",
               ID: "CVE-2019-11291",
               STATE: "PUBLIC",
               TITLE: "RabbitMQ XSS attack via federation and shovel endpoints",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "RabbitMQ",
                                 version: {
                                    version_data: [
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "3.8",
                                          version_value: "v3.8.1",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "3.7",
                                          version_value: "v3.7.20",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "RabbitMQ for Pivotal Platform",
                                 version: {
                                    version_data: [
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "1.17",
                                          version_value: "1.17.4",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "1.16",
                                          version_value: "1.16.7",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Pivotal",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 3.1,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-79: Cross-site Scripting (XSS) - Generic",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://pivotal.io/security/cve-2019-11291",
                     refsource: "CONFIRM",
                     url: "https://pivotal.io/security/cve-2019-11291",
                  },
                  {
                     name: "RHSA-2020:0553",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0553",
                  },
               ],
            },
            source: {
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "862b2186-222f-48b9-af87-f1fb7bb26d03",
      assignerShortName: "pivotal",
      cveId: "CVE-2019-11291",
      datePublished: "2019-11-22T22:56:08.641103Z",
      dateReserved: "2019-04-18T00:00:00",
      dateUpdated: "2024-09-17T00:31:38.392Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-9649
Vulnerability from cvelistv5
Published
2015-01-27 17:00
Modified
2024-08-06 13:47
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:47:41.729Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2016:0308",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
               },
               {
                  name: "76084",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76084",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
               },
               {
                  name: "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-10-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-01T15:57:02",
            orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
            shortName: "canonical",
         },
         references: [
            {
               name: "RHSA-2016:0308",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
            },
            {
               name: "76084",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76084",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
            },
            {
               name: "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@ubuntu.com",
               ID: "CVE-2014-9649",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2016:0308",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0308.html",
                  },
                  {
                     name: "76084",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76084",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs",
                     refsource: "CONFIRM",
                     url: "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs",
                  },
                  {
                     name: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
                     refsource: "CONFIRM",
                     url: "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
                  },
                  {
                     name: "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/01/21/13",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
      assignerShortName: "canonical",
      cveId: "CVE-2014-9649",
      datePublished: "2015-01-27T17:00:00",
      dateReserved: "2015-01-27T00:00:00",
      dateUpdated: "2024-08-06T13:47:41.729Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-22117
Vulnerability from cvelistv5
Published
2021-05-18 12:47
Modified
2024-08-03 18:30
Severity ?
Summary
RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.
References
Impacted products
Vendor Product Version
n/a RabbitMQ Version: RabbitMQ Windows installers prior to version 3.8.16
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:30:23.929Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://tanzu.vmware.com/security/cve-2021-22117",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "RabbitMQ",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "RabbitMQ Windows installers prior to version 3.8.16",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-94",
                     description: "CWE-94: Improper Control of Generation of Code",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-05-18T12:47:11",
            orgId: "dcf2e128-44bd-42ed-91e8-88f912c1401d",
            shortName: "vmware",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://tanzu.vmware.com/security/cve-2021-22117",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@vmware.com",
               ID: "CVE-2021-22117",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "RabbitMQ",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "RabbitMQ Windows installers prior to version 3.8.16",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-94: Improper Control of Generation of Code",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://tanzu.vmware.com/security/cve-2021-22117",
                     refsource: "MISC",
                     url: "https://tanzu.vmware.com/security/cve-2021-22117",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "dcf2e128-44bd-42ed-91e8-88f912c1401d",
      assignerShortName: "vmware",
      cveId: "CVE-2021-22117",
      datePublished: "2021-05-18T12:47:11",
      dateReserved: "2021-01-04T00:00:00",
      dateUpdated: "2024-08-03T18:30:23.929Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}