Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11281

Опубликовано: 14 окт. 2019
Источник: redhat
CVSS3: 4.9
EPSS Низкий

Описание

Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.

A vulnerability was found in the rabbitmq-server. User input for the virtual host limits page and the federation management UI was not properly sanitized. A remote, authenticated administrative user could create a cross-site scripting attack leading to access to virtual hosts and policy management information.

Меры по смягчению последствий

There is no mitigation for this issue, the flaw can only be resolved by applying updates.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rabbitmq-serverNot affected
Red Hat Ansible Tower 3rabbitmq-serverNot affected
Red Hat OpenStack Platform 10 (Newton)rabbitmq-serverWill not fix
Red Hat OpenStack Platform 13 (Queens)rabbitmq-serverWill not fix
Red Hat OpenStack Platform 14 (Rocky)rabbitmq-serverOut of support scope
Red Hat OpenStack Platform 15.0 (Stein)rabbitmq-serverFixedRHSA-2020:007813.01.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1764329rabbitmq-server: improper sanitization of vhost limits and federation management UI pages

EPSS

Процентиль: 77%
0.01014
Низкий

4.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.8
ubuntu
больше 6 лет назад

Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.

CVSS3: 4.8
nvd
больше 6 лет назад

Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.

CVSS3: 4.8
debian
больше 6 лет назад

Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, ver ...

CVSS3: 4.8
github
больше 3 лет назад

Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.

CVSS3: 4.8
fstec
больше 6 лет назад

Уязвимость брокера сообщений RabbitMQ, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 77%
0.01014
Низкий

4.9 Medium

CVSS3

Уязвимость CVE-2019-11281