First published: Sun Jan 18 2015(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the management web UI in the RabbitMQ management plugin before 3.4.3 allow remote authenticated users to inject arbitrary web script or HTML via (1) message details when a message is unqueued, such as headers or arguments; (2) policy names, which are not properly handled when viewing policies; (3) details for AMQP network clients, such as the version; allow remote authenticated administrators to inject arbitrary web script or HTML via (4) user names, (5) the cluster name; or allow RabbitMQ cluster administrators to (6) modify unspecified content.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RabbitMQ (Pivotal Software) | <=3.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0862 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2015-0862, upgrade the RabbitMQ management plugin to version 3.4.3 or later.
CVE-2015-0862 affects users of the RabbitMQ management plugin versions prior to 3.4.3.
CVE-2015-0862 includes multiple cross-site scripting (XSS) vulnerabilities in the management web UI.
No, CVE-2015-0862 can only be exploited by remote authenticated users.