Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-32718: Build software better, together

RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user’s bane being rendered in a confirmation message without proper <script> tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable rabbitmq_management plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.

CVE
#vulnerability#java

Affected versions

< 3.8.17

Our team would like to thank Christian Rellmann from usd AG for responsibly disclosing
the vulnerability and helping us verify a fix.

Impact

When a new user was added via management UI, its name was rendered in a confirmation
message without proper <script> tag sanitization, potentially allowing for JavaScript code
execution in the context of the page.

The user must be signed in and have elevated permissions (other user management).

Patches

  • The vulnerability is patched in RabbitMQ 3.8.17 or a later version.
  • rabbitmq/rabbitmq-server#3028

Workarounds

Disable rabbitmq_management plugin and use CLI tools for management operations
and Prometheus and Grafana for metrics and monitoring.

References

None.

For more information

If you have any questions or comments about this advisory, please contact [email protected].

CWEs

CVSS Score

3.1 Low

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda