Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-4966

Опубликовано: 29 мар. 2017
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.

Отчет

This issue affects rabbitmq-server plugins as shipped with:

  • Red Hat Storage Console 2
  • Red Hat Enterprise Linux OpenStack Platform 5,6,7
  • Red Hat OpenStack Platform 8,9,10,11 Although RabbitMQ plugins are shipped in these products, no plugins are enabled or used by default. To verify your environment's plugin usage, run:
# rabbitmq-plugins list

A future update may address this issue. Red Hat Product Security has rated this issue as having Moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)rabbitmq-serverWill not fix
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)rabbitmq-serverWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)rabbitmq-serverWill not fix
Red Hat OpenStack Platform 10 (Newton)rabbitmq-serverWill not fix
Red Hat OpenStack Platform 11 (Ocata)rabbitmq-serverWill not fix
Red Hat OpenStack Platform 8 (Liberty)rabbitmq-serverWill not fix
Red Hat OpenStack Platform 9 (Mitaka)rabbitmq-serverWill not fix
Red Hat Storage Console 2rabbitmq-serverWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-522
https://bugzilla.redhat.com/show_bug.cgi?id=1448337rabbitmq: Authentication details are stored in browser-local storage without expiration

EPSS

Процентиль: 40%
0.00187
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.

CVSS3: 7.8
nvd
больше 8 лет назад

An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.

CVSS3: 7.8
debian
больше 8 лет назад

An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.

CVSS3: 7.8
fstec
больше 8 лет назад

Уязвимость брокера сообщений RabbitMQ, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 40%
0.00187
Низкий

5.5 Medium

CVSS3