First published: Wed Oct 16 2019(Updated: )
Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software RabbitMQ | <3.7.18 | |
Pivotal Software Rabbitmq | >=1.15.0<1.15.13 | |
Pivotal Software Rabbitmq | >=1.16.0<1.16.6 | |
Pivotal Software Rabbitmq | >=1.17.0<1.17.3 | |
Redhat Openstack | =15 | |
Redhat Openstack For Ibm Power | =15 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-11281 is medium with a CVSS score of 4.8.
Pivotal RabbitMQ versions prior to v3.7.18, RabbitMQ for PCF versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3 are affected by CVE-2019-11281.
The virtual host limits page and the federation management UI in Pivotal RabbitMQ and RabbitMQ for PCF are affected by CVE-2019-11281.
User input may not be properly sanitized in the virtual host limits page and the federation management UI in Pivotal RabbitMQ and RabbitMQ for PCF.
To fix CVE-2019-11281, upgrade to Pivotal RabbitMQ version 3.7.18 or later and RabbitMQ for PCF version 1.15.13 or later.