First published: Sun Sep 18 2016(Updated: )
The metrics-collection component in RabbitMQ for Pivotal Cloud Foundry (PCF) 1.6.x before 1.6.4 logs command lines of failed commands, which might allow context-dependent attackers to obtain sensitive information by reading the log data, as demonstrated by a syslog message that contains credentials from a command line.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
RabbitMQ (Pivotal Software) | =1.6.0 | |
RabbitMQ (Pivotal Software) | =1.6.1 | |
RabbitMQ (Pivotal Software) | =1.6.2 | |
RabbitMQ (Pivotal Software) | =1.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0929 has a Medium severity rating due to its potential exposure of sensitive information through logs.
To fix CVE-2016-0929, upgrade RabbitMQ for Pivotal Cloud Foundry to version 1.6.4 or later.
CVE-2016-0929 affects RabbitMQ versions 1.6.0 through 1.6.3.
CVE-2016-0929 may expose sensitive information including credentials through the logging of failed command lines.
CVE-2016-0929 can potentially be exploited by context-dependent attackers with access to the log data.