An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html | Third Party Advisory |
https://pivotal.io/security/cve-2017-4966 | Mitigation Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html | Third Party Advisory |
https://pivotal.io/security/cve-2017-4966 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html - Third Party Advisory | |
References | () https://pivotal.io/security/cve-2017-4966 - Mitigation, Vendor Advisory |
Information
Published : 2017-06-13 06:29
Updated : 2024-11-21 03:26
NVD link : CVE-2017-4966
Mitre link : CVE-2017-4966
CVE.ORG link : CVE-2017-4966
JSON object : View
Products Affected
vmware
- rabbitmq
debian
- debian_linux
pivotal_software
- rabbitmq
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor