Описание
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
Отчет
This issue affects rabbitmq-server plugins as shipped with:
- Red Hat Storage Console 2
- Red Hat Enterprise Linux OpenStack Platform 5,6,7
- Red Hat OpenStack Platform 8,9,10,11 Although RabbitMQ plugins are shipped in these products, no plugins are enabled or used by default. To verify your environment's plugin usage, run:
A future update may address this issue. Red Hat Product Security has rated this issue as having Moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse) | rabbitmq-server | Will not fix | ||
| Red Hat Enterprise Linux OpenStack Platform 6 (Juno) | rabbitmq-server | Will not fix | ||
| Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) | rabbitmq-server | Will not fix | ||
| Red Hat OpenStack Platform 10 (Newton) | rabbitmq-server | Will not fix | ||
| Red Hat OpenStack Platform 11 (Ocata) | rabbitmq-server | Will not fix | ||
| Red Hat OpenStack Platform 8 (Liberty) | rabbitmq-server | Will not fix | ||
| Red Hat OpenStack Platform 9 (Mitaka) | rabbitmq-server | Will not fix | ||
| Red Hat Storage Console 2 | rabbitmq-server | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
5.5 Medium
CVSS3
Связанные уязвимости
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x ...
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
Уязвимость брокера сообщений RabbitMQ, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
EPSS
5.5 Medium
CVSS3