First published: Tue Jan 27 2015(Updated: )
CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
RabbitMQ (Pivotal Software) | =2.1.0 | |
RabbitMQ (Pivotal Software) | =2.1.1 | |
RabbitMQ (Pivotal Software) | =2.2.0 | |
RabbitMQ (Pivotal Software) | =2.3.0 | |
RabbitMQ (Pivotal Software) | =2.3.1 | |
RabbitMQ (Pivotal Software) | =2.4.0 | |
RabbitMQ (Pivotal Software) | =2.4.1 | |
RabbitMQ (Pivotal Software) | =2.5.0 | |
RabbitMQ (Pivotal Software) | =2.5.1 | |
RabbitMQ (Pivotal Software) | =2.6.0 | |
RabbitMQ (Pivotal Software) | =2.6.1 | |
RabbitMQ (Pivotal Software) | =2.7.0 | |
RabbitMQ (Pivotal Software) | =2.7.1 | |
RabbitMQ (Pivotal Software) | =2.8.0 | |
RabbitMQ (Pivotal Software) | =2.8.1 | |
RabbitMQ (Pivotal Software) | =2.8.2 | |
RabbitMQ (Pivotal Software) | =2.8.3 | |
RabbitMQ (Pivotal Software) | =2.8.4 | |
RabbitMQ (Pivotal Software) | =2.8.5 | |
RabbitMQ (Pivotal Software) | =2.8.6 | |
RabbitMQ (Pivotal Software) | =2.8.7 | |
RabbitMQ (Pivotal Software) | =3.0.0 | |
RabbitMQ (Pivotal Software) | =3.0.1 | |
RabbitMQ (Pivotal Software) | =3.0.2 | |
RabbitMQ (Pivotal Software) | =3.0.3 | |
RabbitMQ (Pivotal Software) | =3.0.4 | |
RabbitMQ (Pivotal Software) | =3.1.0 | |
RabbitMQ (Pivotal Software) | =3.1.1 | |
RabbitMQ (Pivotal Software) | =3.1.2 | |
RabbitMQ (Pivotal Software) | =3.1.3 | |
RabbitMQ (Pivotal Software) | =3.1.4 | |
RabbitMQ (Pivotal Software) | =3.1.5 | |
RabbitMQ (Pivotal Software) | =3.2.0 | |
RabbitMQ (Pivotal Software) | =3.2.1 | |
RabbitMQ (Pivotal Software) | =3.2.2 | |
RabbitMQ (Pivotal Software) | =3.2.3 | |
RabbitMQ (Pivotal Software) | =3.2.4 | |
RabbitMQ (Pivotal Software) | =3.3.0 | |
RabbitMQ (Pivotal Software) | =3.3.1 | |
RabbitMQ (Pivotal Software) | =3.3.2 | |
RabbitMQ (Pivotal Software) | =3.3.3 | |
RabbitMQ (Pivotal Software) | =3.3.4 | |
RabbitMQ (Pivotal Software) | =3.3.5 | |
RabbitMQ (Pivotal Software) | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9650 has been assigned a medium severity rating due to its potential for HTTP response splitting attacks.
To fix CVE-2014-9650, upgrade RabbitMQ to version 3.4.1 or later.
CVE-2014-9650 affects RabbitMQ versions from 2.1.0 to 3.4.0.
Yes, CVE-2014-9650 can be exploited remotely due to its nature of accepting malicious input parameters.
CVE-2014-9650 can enable attacks such as HTTP response splitting and arbitrary HTTP header injection.