Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11291

Опубликовано: 13 дек. 2019
Источник: redhat
CVSS3: 3.1

Описание

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

A flaw was discovered in rabbitmq-server where two endpoints, federation and shovel, do not properly sanitize user input. A remote, authenticated user, with administrative access, could execute a cross site scripting attack, using the vhost or node name fields, that could grant access to virtual hosts and policy management information. The largest threat associated with this vulnerability is to data confidentiality and integrity.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rabbitmq-serverNot affected
Red Hat Ansible Tower 3rabbitmq-serverNot affected
Red Hat OpenStack Platform 10 (Newton)rabbitmq-serverOut of support scope
Red Hat OpenStack Platform 13 (Queens)rabbitmq-serverNot affected
Red Hat OpenStack Platform 14 (Rocky)rabbitmq-serverNot affected
Red Hat OpenStack Platform 16 (Train)rabbitmq-serverAffected
Red Hat OpenStack Platform 15.0 (Stein)rabbitmq-serverFixedRHSA-2020:055319.02.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1783327rabbitmq-server: not properly sanitized user input may lead to XSS

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 4.8
ubuntu
около 6 лет назад

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

CVSS3: 4.8
nvd
около 6 лет назад

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

CVSS3: 4.8
debian
около 6 лет назад

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior ...

CVSS3: 3.5
github
больше 3 лет назад

Cross-site Scripting in RabbitMQ

CVSS3: 3.1
fstec
больше 6 лет назад

Уязвимость компонентов federation и shovel брокера сообщений RabbitMQ, позволяющая нарушителю оказать воздействие на целостность данных

3.1 Low

CVSS3