An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3761 - | |
References | () http://www.securityfocus.com/bid/95065 - | |
References | () https://pivotal.io/security/cve-2016-9877 - Mitigation, Vendor Advisory | |
References | () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us - |
Information
Published : 2016-12-29 09:59
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9877
Mitre link : CVE-2016-9877
CVE.ORG link : CVE-2016-9877
JSON object : View
Products Affected
vmware
- rabbitmq
pivotal_software
- rabbitmq
CWE
CWE-284
Improper Access Control