First published: Tue Jan 27 2015(Updated: )
CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Rabbitmq | =2.1.0 | |
Vmware Rabbitmq | =2.1.1 | |
Vmware Rabbitmq | =2.2.0 | |
Vmware Rabbitmq | =2.3.0 | |
Vmware Rabbitmq | =2.3.1 | |
Vmware Rabbitmq | =2.4.0 | |
Vmware Rabbitmq | =2.4.1 | |
Vmware Rabbitmq | =2.5.0 | |
Vmware Rabbitmq | =2.5.1 | |
Vmware Rabbitmq | =2.6.0 | |
Vmware Rabbitmq | =2.6.1 | |
Vmware Rabbitmq | =2.7.0 | |
Vmware Rabbitmq | =2.7.1 | |
Vmware Rabbitmq | =2.8.0 | |
Vmware Rabbitmq | =2.8.1 | |
Vmware Rabbitmq | =2.8.2 | |
Vmware Rabbitmq | =2.8.3 | |
Vmware Rabbitmq | =2.8.4 | |
Vmware Rabbitmq | =2.8.5 | |
Vmware Rabbitmq | =2.8.6 | |
Vmware Rabbitmq | =2.8.7 | |
Vmware Rabbitmq | =3.0.0 | |
Vmware Rabbitmq | =3.0.1 | |
Vmware Rabbitmq | =3.0.2 | |
Vmware Rabbitmq | =3.0.3 | |
Vmware Rabbitmq | =3.0.4 | |
Vmware Rabbitmq | =3.1.0 | |
Vmware Rabbitmq | =3.1.1 | |
Vmware Rabbitmq | =3.1.2 | |
Vmware Rabbitmq | =3.1.3 | |
Vmware Rabbitmq | =3.1.4 | |
Vmware Rabbitmq | =3.1.5 | |
Vmware Rabbitmq | =3.2.0 | |
Vmware Rabbitmq | =3.2.1 | |
Vmware Rabbitmq | =3.2.2 | |
Vmware Rabbitmq | =3.2.3 | |
Vmware Rabbitmq | =3.2.4 | |
Vmware Rabbitmq | =3.3.0 | |
Vmware Rabbitmq | =3.3.1 | |
Vmware Rabbitmq | =3.3.2 | |
Vmware Rabbitmq | =3.3.3 | |
Vmware Rabbitmq | =3.3.4 | |
Vmware Rabbitmq | =3.3.5 | |
Vmware Rabbitmq | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.