An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
References
Link | Resource |
---|---|
https://pivotal.io/security/cve-2017-4966 | Mitigation Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2017-06-12 23:29
Updated : 2022-05-15 07:13
NVD link : CVE-2017-4966
Mitre link : CVE-2017-4966
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
vmware
- rabbitmq
pivotal_software
- rabbitmq