CVE-2016-9877
Published: 29 December 2016
An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
Priority
Status
Package | Release | Status |
---|---|---|
rabbitmq-server Launchpad, Ubuntu, Debian |
precise |
Ignored
(end of life)
|
trusty |
Released
(3.2.4-1ubuntu0.1)
|
|
upstream |
Released
(3.5.8, 3.6.6)
|
|
xenial |
Released
(3.5.7-1ubuntu0.16.04.2)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Not vulnerable
(3.6.6-1)
|
|
Patches: upstream: https://github.com/rabbitmq/rabbitmq-mqtt/commit/039a3c22e57bf77b325d19494a9b20cd745f1ea7 upstream: https://github.com/rabbitmq/rabbitmq-mqtt/commit/157948d86d391a325ac9702f78976c175ced58be |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |