fkie_cve-2017-4967
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html | Third Party Advisory | |
| security_alert@emc.com | https://pivotal.io/security/cve-2017-4965 | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2017-4965 | Mitigation, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755456D9-7249-4092-970C-230729E2F856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "74804A09-A266-45F3-BB54-73892AD1D22D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "08DE4A7C-EEA5-46E5-8604-041B721DC3E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "83206370-1606-4D4C-94F2-6B21885ADB6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36AA89DA-AE78-409B-B4FF-B743490F76C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "90973C7F-E63D-4C00-BB6A-DA2F796697E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F451B7B3-9272-4184-B18A-87ED6B3D2756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9166D68-CC18-4F53-9DA6-FA10B93E7702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BE205B46-5ACF-44B9-877A-FDC67AA7079F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1D0FDB23-6A99-4783-871A-CD25E20F044D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:rabbitmq_server:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5A315D37-F74F-4EF2-9F47-9639BEBEAB05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0DE6A4B2-0445-470B-B18C-2CFEB2A52455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0B52805C-6F10-4BCD-AA74-3E0C0FF5E3C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5FE2FBE9-5D35-4273-8B83-A400D3A0136D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B11709F3-3F1C-4FC2-9F2D-87951EC04308",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "32F9F3F6-B1AF-423F-9F96-4329589B323A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AECBDFAA-198F-4A47-835A-4E17C090DF02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D879D6FD-39D7-4589-8DE7-C8DAAE6F165E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CE842A15-D676-4E00-AAD7-1088CE122876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F40845F9-00D8-44F0-8B2E-60094A3D37CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3772B181-64DB-43AA-99C1-21378CF91E51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.0:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "0DA89B77-6455-40CD-931E-BB07CD9A3166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.1:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "52350E43-4AB5-45ED-AC31-CC948DB87631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.2:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "42856F22-74CD-4278-8EAA-2C6582A7E658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.3:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "F1C7EE64-A51B-4D02-AAC4-20F4D3FCB110",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.4:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "B0D8589A-B843-4130-8CC8-3D4C464CDB4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.5:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "62016F87-0B15-4D1B-A2AB-FC4769F95DB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.6:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "7DF99EF7-AFCB-4CA5-8F28-ABC9118612CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.7:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "2D9F3D8B-DDB3-4175-AAD7-8F952E9A7D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.8:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "C5125B26-63EE-4FE8-97A1-DC6E11757ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.9:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "6AF3BAA0-0AEA-4B96-9C91-E51789844A39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.10:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "DD5F0850-F34B-4E79-A46D-B74F2E90C43A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.11:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "DF23DD7D-16B4-408C-A825-C79487D79A0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.12:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "E792D92E-07A1-4E48-90CB-5EC7C99E0AF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.13:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "B873D04B-704B-468D-A2B1-8E04653806F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.14:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "13C9004B-590A-45F0-8AA9-713928A8F5F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.15:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "F22B84B3-438E-4E08-A02D-4A85C0C561B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.17:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "501A5F31-6DBA-4E90-8BAD-E1DFD0967D0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.18:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "3E99B39C-21AF-4F75-8D96-9B69F48C2A39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.5.19:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "0CFACCBF-6C53-4A7F-AC0F-8A2D03E6D6EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.0:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "3C6E80B6-857B-4D53-B107-8667EFCCE0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.1:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "95C7294C-C9D3-40F8-B3C9-40424D5FC124",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.2:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "66F85747-11AA-4133-B553-3C31152F0781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.3:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "B425D53C-5713-401E-BE30-BCDE54F65857",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.4:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "758D57BA-3EA6-4036-8BDD-5BA2AAE25F77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.5:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "036437B9-1A7F-4C60-B9FE-B38173BC6FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.6:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "408D457F-4DE5-4280-8379-083DA78ECF00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.7:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "C9D2B08D-9779-4E80-BAB6-870F81F24F7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.8:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "90F47590-6640-494F-8A93-A9AC70459DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.9:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "5D1F88E0-4047-4ADE-A898-88FE6358D659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.10:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "8647C50B-41CB-45CE-89E7-BB4B2759DE40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.12:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "4960386C-07D9-4367-945C-278595DB6C0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.13:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "A49DCDFA-4D98-4AEC-91A1-612B85DDFB04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.14:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "4FEB47ED-5D35-4151-B087-8324339DE5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.15:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "65A513AD-9236-42D7-9D04-F318A5815640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.6.16:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "6647F298-1B11-46D8-B68A-6B284BB1F7AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.0:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "9997C9C6-4918-4B74-92E4-012B58278DEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.2:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "F6DB5A36-22F9-4A2C-9ED0-68D1434B06D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.3:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "33C0370F-77A5-4A51-ABF2-21793CD57043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.4:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "4C3C0A88-66F6-46D5-9A79-BEFB654979D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.5:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "1EC26CD6-172D-4DBE-8B23-59491E4765E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.6:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "669EA6CA-3F6C-4151-986D-173F1375B32B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.7:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "69960839-7C03-4542-80D3-5C71795F8159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.8:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "82CA3E75-AFD0-486A-9EFA-71A8CA780632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.9:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "921374B4-B99F-4863-99D8-9FD938EF8EF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.10:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "C5344CFC-3100-4407-93E4-65594C3741B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.13:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "06B09408-573D-47A8-BC84-724DD88976E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:rabbitmq:1.7.14:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "ADF54631-875A-45C4-9C0A-4836AB1F8309",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en estas versiones de RabbitMQ de Pivotal: todas las versiones 3.4.x, todas las versiones 3.5.x y versiones 3.6.x anteriores a 3.6.9; y en estas versiones de RabbitMQ de Pivotal para PCF: todas las versiones 1.5.x, versiones 1.6.x anteriores a 1.6.18 y versiones 1.7.x anteriores a 1.7.15. Varios formularios en la interfaz de usuario de administraci\u00f3n de RabbitMQ son vulnerables a los ataques de tipo XSS."
}
],
"id": "CVE-2017-4967",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-06-13T06:29:00.520",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html"
},
{
"source": "security_alert@emc.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://pivotal.io/security/cve-2017-4965"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://pivotal.io/security/cve-2017-4965"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…