#VU38873 Cross-site scripting in RabbitMQ - CVE-2017-4965


| Updated: 2020-08-08

Vulnerability identifier: #VU38873

Vulnerability risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-4965

CWE-ID: CWE-79

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
RabbitMQ
Client/Desktop applications / Messaging software

Vendor: VMware, Inc

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.

Mitigation
Install update from vendor's website.

Vulnerable software versions

RabbitMQ: 1.5.0 - 3.6.7


External links
https://www.securityfocus.com/bid/98394
https://pivotal.io/security/cve-2017-4965


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability