First published: Tue Jun 13 2017(Updated: )
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/rabbitmq-server | <3.5.7-1ubuntu0.16.04.4+ | 3.5.7-1ubuntu0.16.04.4+ |
ubuntu/rabbitmq-server | <3.6.9 | 3.6.9 |
debian/rabbitmq-server | 3.7.8-4 3.8.2-1+deb10u2 3.8.9-3+deb11u1 3.10.8-1.1+deb12u1 3.10.8-3 | |
Pivotal Software Bosh CLI | =3.5.4 | |
Pivotal Software Bosh CLI | =3.5.5 | |
Pivotal Software Bosh CLI | =3.5.7 | |
Pivotal Software Bosh CLI | =3.6.0 | |
Pivotal Software Bosh CLI | =3.6.1 | |
Pivotal Software Bosh CLI | =3.6.2 | |
Pivotal Software Bosh CLI | =3.6.3 | |
Pivotal Software Bosh CLI | =3.6.4 | |
Pivotal Software Bosh CLI | =3.6.5 | |
Pivotal Software Bosh CLI | =3.6.6 | |
RabbitMQ (Pivotal Software) | =3.4.0 | |
RabbitMQ (Pivotal Software) | =3.4.1 | |
RabbitMQ (Pivotal Software) | =3.4.2 | |
RabbitMQ (Pivotal Software) | =3.4.3 | |
RabbitMQ (Pivotal Software) | =3.4.4 | |
RabbitMQ (Pivotal Software) | =3.5.0 | |
RabbitMQ (Pivotal Software) | =3.5.1 | |
RabbitMQ (Pivotal Software) | =3.5.2 | |
RabbitMQ (Pivotal Software) | =3.5.3 | |
RabbitMQ (Pivotal Software) | =3.5.6 | |
RabbitMQ (Pivotal Software) | =3.6.7 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.0 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.1 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.2 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.3 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.4 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.5 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.6 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.7 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.8 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.9 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.10 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.11 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.12 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.13 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.14 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.15 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.17 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.18 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.5.19 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.0 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.1 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.2 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.3 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.4 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.5 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.6 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.7 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.8 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.9 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.10 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.12 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.13 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.14 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.15 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.6.16 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.0 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.2 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.3 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.4 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.5 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.6 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.7 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.8 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.9 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.10 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.13 | |
Pivotal RabbitMQ for Pivotal Cloud Foundry | =1.7.14 | |
Debian Linux | =9.0 | |
RabbitMQ Server | =3.4.0 | |
RabbitMQ Server | =3.4.1 | |
RabbitMQ Server | =3.4.2 | |
RabbitMQ Server | =3.4.3 | |
RabbitMQ Server | =3.4.4 | |
RabbitMQ Server | =3.5.0 | |
RabbitMQ Server | =3.5.1 | |
RabbitMQ Server | =3.5.2 | |
RabbitMQ Server | =3.5.3 | |
RabbitMQ Server | =3.5.6 | |
RabbitMQ Server | =3.6.7 |
https://github.com/rabbitmq/rabbitmq-management/commit/2371633f99ad0d293899384f078872ff9e9f3e10
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4966 is classified as a medium-severity vulnerability due to its potential to allow unauthorized access to sensitive information within RabbitMQ.
To fix CVE-2017-4966, upgrade your RabbitMQ installation to version 3.6.9 or later for 3.6.x series, or to version 1.6.18 or later for RabbitMQ for PCF.
CVE-2017-4966 affects all versions of RabbitMQ in the 3.4.x, 3.5.x, and 3.6.x series prior to 3.6.9, as well as RabbitMQ for PCF versions before 1.6.18.
CVE-2017-4966 may allow attackers to gain unauthorized access to the RabbitMQ management UI, potentially exposing sensitive configuration and user data.
A potential workaround for CVE-2017-4966 includes disabling the management plugin until an upgrade can be applied.