An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
                
            References
                    | Link | Resource | 
|---|---|
| https://pivotal.io/security/cve-2017-4966 | Mitigation Vendor Advisory | 
| https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Configuration 2 (hide)
                                
                                
  | 
                        
Configuration 3 (hide)
                                
                                
  | 
                        
Information
                Published : 2017-06-12 23:29
Updated : 2022-05-15 07:13
NVD link : CVE-2017-4966
Mitre link : CVE-2017-4966
JSON object : View
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
                debian
- debian_linux
 
vmware
- rabbitmq
 
pivotal_software
- rabbitmq
 


