First published: Mon Jul 31 2023(Updated: )
It was discovered that RabbitMQ incorrectly handled certain signed-in user credentials. An attacker could possibly use this issue to expose sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/rabbitmq-server | <3.5.7-1ubuntu0.16.04.4+esm2 | 3.5.7-1ubuntu0.16.04.4+esm2 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6265-1 is considered to be moderate due to the potential exposure of sensitive user credentials.
To fix USN-6265-1, upgrade RabbitMQ to version 3.5.7-1ubuntu0.16.04.4+esm2 or later.
USN-6265-1 affects RabbitMQ server versions prior to 3.5.7-1ubuntu0.16.04.4+esm2 on Ubuntu 16.04.
Yes, USN-6265-1 could potentially allow attackers to expose sensitive information through improper handling of user credentials.
Users of RabbitMQ on Ubuntu 16.04 should immediately upgrade to the patched version to mitigate any risks associated with USN-6265-1.