First published: Tue Jun 13 2017(Updated: )
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software RabbitMQ | =3.5.4 | |
Pivotal Software RabbitMQ | =3.5.5 | |
Pivotal Software RabbitMQ | =3.5.7 | |
Pivotal Software RabbitMQ | =3.6.0 | |
Pivotal Software RabbitMQ | =3.6.1 | |
Pivotal Software RabbitMQ | =3.6.2 | |
Pivotal Software RabbitMQ | =3.6.3 | |
Pivotal Software RabbitMQ | =3.6.4 | |
Pivotal Software RabbitMQ | =3.6.5 | |
Pivotal Software RabbitMQ | =3.6.6 | |
Vmware Rabbitmq | =3.4.0 | |
Vmware Rabbitmq | =3.4.1 | |
Vmware Rabbitmq | =3.4.2 | |
Vmware Rabbitmq | =3.4.3 | |
Vmware Rabbitmq | =3.4.4 | |
Vmware Rabbitmq | =3.5.0 | |
Vmware Rabbitmq | =3.5.1 | |
Vmware Rabbitmq | =3.5.2 | |
Vmware Rabbitmq | =3.5.3 | |
Vmware Rabbitmq | =3.5.6 | |
Vmware Rabbitmq | =3.6.7 | |
Pivotal Software Rabbitmq | =1.5.0 | |
Pivotal Software Rabbitmq | =1.5.1 | |
Pivotal Software Rabbitmq | =1.5.2 | |
Pivotal Software Rabbitmq | =1.5.3 | |
Pivotal Software Rabbitmq | =1.5.4 | |
Pivotal Software Rabbitmq | =1.5.5 | |
Pivotal Software Rabbitmq | =1.5.6 | |
Pivotal Software Rabbitmq | =1.5.7 | |
Pivotal Software Rabbitmq | =1.5.8 | |
Pivotal Software Rabbitmq | =1.5.9 | |
Pivotal Software Rabbitmq | =1.5.10 | |
Pivotal Software Rabbitmq | =1.5.11 | |
Pivotal Software Rabbitmq | =1.5.12 | |
Pivotal Software Rabbitmq | =1.5.13 | |
Pivotal Software Rabbitmq | =1.5.14 | |
Pivotal Software Rabbitmq | =1.5.15 | |
Pivotal Software Rabbitmq | =1.5.17 | |
Pivotal Software Rabbitmq | =1.5.18 | |
Pivotal Software Rabbitmq | =1.5.19 | |
Pivotal Software Rabbitmq | =1.6.0 | |
Pivotal Software Rabbitmq | =1.6.1 | |
Pivotal Software Rabbitmq | =1.6.2 | |
Pivotal Software Rabbitmq | =1.6.3 | |
Pivotal Software Rabbitmq | =1.6.4 | |
Pivotal Software Rabbitmq | =1.6.5 | |
Pivotal Software Rabbitmq | =1.6.6 | |
Pivotal Software Rabbitmq | =1.6.7 | |
Pivotal Software Rabbitmq | =1.6.8 | |
Pivotal Software Rabbitmq | =1.6.9 | |
Pivotal Software Rabbitmq | =1.6.10 | |
Pivotal Software Rabbitmq | =1.6.12 | |
Pivotal Software Rabbitmq | =1.6.13 | |
Pivotal Software Rabbitmq | =1.6.14 | |
Pivotal Software Rabbitmq | =1.6.15 | |
Pivotal Software Rabbitmq | =1.6.16 | |
Pivotal Software Rabbitmq | =1.7.0 | |
Pivotal Software Rabbitmq | =1.7.2 | |
Pivotal Software Rabbitmq | =1.7.3 | |
Pivotal Software Rabbitmq | =1.7.4 | |
Pivotal Software Rabbitmq | =1.7.5 | |
Pivotal Software Rabbitmq | =1.7.6 | |
Pivotal Software Rabbitmq | =1.7.7 | |
Pivotal Software Rabbitmq | =1.7.8 | |
Pivotal Software Rabbitmq | =1.7.9 | |
Pivotal Software Rabbitmq | =1.7.10 | |
Pivotal Software Rabbitmq | =1.7.13 | |
Pivotal Software Rabbitmq | =1.7.14 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.