CVE-2014-9649
Published: 27 January 2015
Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.
Priority
Status
Package | Release | Status |
---|---|---|
rabbitmq-server Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(3.4.2-2)
|
bionic |
Not vulnerable
(3.4.2-2)
|
|
cosmic |
Not vulnerable
(3.4.2-2)
|
|
disco |
Not vulnerable
(3.4.2-2)
|
|
lucid |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(3.4.2)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Not vulnerable
(3.4.2-2)
|
|
wily |
Not vulnerable
(3.4.2-2)
|
|
xenial |
Not vulnerable
(3.4.2-2)
|
|
yakkety |
Not vulnerable
(3.4.2-2)
|
|
zesty |
Not vulnerable
(3.4.2-2)
|
|
Patches: upstream: https://github.com/rabbitmq/rabbitmq-web-dispatch/commit/7138dd778571334817af74db899f7e1b557e21da |