Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9pf7-f47q-mwpq

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 3.5

Описание

Cross-site Scripting in RabbitMQ

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

Пакеты

Наименование

rabbit_common

Затронутые версииВерсия исправления

>= 3.7.0, < 3.7.20

3.7.20

Наименование

rabbit_common

Затронутые версииВерсия исправления

>= 3.8.0, < 3.8.1

3.8.1

EPSS

Процентиль: 65%
0.00481
Низкий

3.5 Low

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.8
ubuntu
около 6 лет назад

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

CVSS3: 3.1
redhat
около 6 лет назад

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

CVSS3: 4.8
nvd
около 6 лет назад

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

CVSS3: 4.8
debian
около 6 лет назад

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior ...

CVSS3: 3.1
fstec
больше 6 лет назад

Уязвимость компонентов federation и shovel брокера сообщений RabbitMQ, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 65%
0.00481
Низкий

3.5 Low

CVSS3

Дефекты

CWE-79