CVE-2014-9650
Published: 27 January 2015
CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.
Priority
Status
Package | Release | Status |
---|---|---|
rabbitmq-server Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(3.4.2-2)
|
bionic |
Not vulnerable
(3.4.2-2)
|
|
cosmic |
Not vulnerable
(3.4.2-2)
|
|
disco |
Not vulnerable
(3.4.2-2)
|
|
lucid |
Ignored
(reached end-of-life)
|
|
precise |
Does not exist
(precise was needed)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(3.4.2)
|
|
utopic |
Ignored
(reached end-of-life)
|
|
vivid |
Not vulnerable
(3.4.2-2)
|
|
wily |
Not vulnerable
(3.4.2-2)
|
|
xenial |
Not vulnerable
(3.4.2-2)
|
|
yakkety |
Not vulnerable
(3.4.2-2)
|
|
zesty |
Not vulnerable
(3.4.2-2)
|
|
Patches: upstream: https://github.com/rabbitmq/rabbitmq-management/commit/b5a5fc31bd49ad821a655ea9e2fe920d670a62ad |