First published: Thu Aug 27 2020(Updated: )
RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software RabbitMQ | <3.7.28 | |
Vmware Rabbitmq | >=3.8.0<3.8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5419 is a vulnerability in RabbitMQ versions 3.8.x prior to 3.8.7 that allows a local authenticated attacker with write privileges to execute arbitrary code on the system.
CVE-2020-5419 has a severity rating of 7.8 (high).
CVE-2020-5419 affects VMware RabbitMQ versions 3.8.0 to 3.8.7.
To exploit CVE-2020-5419, an attacker needs write privileges to the RabbitMQ installation directory and local access to the system.
Yes, updating to RabbitMQ version 3.8.7 fixes the CVE-2020-5419 vulnerability.