#VU69263 Use of insufficiently random values in RabbitMQ Server


Published: 2022-11-13

Vulnerability identifier: #VU69263

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-31008

CWE-ID: CWE-330

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
RabbitMQ Server
Server applications / Other server solutions

Vendor: VMware, Inc

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exist due to insufficient randomization in Shovel and Federation plugins when obfuscating URI. The encryption key used to encrypt the URI was seeded with a predictable secret. A remote attacker can gain access to sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

RabbitMQ Server: 3.10.0 - 3.10.1, 3.9.0 - 3.9.17, 3.8.0 - 3.8.31


External links
http://github.com/rabbitmq/rabbitmq-server/pull/4841
http://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-v9gv-xp36-jgj8


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability