Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2017-4966

Published: 13 June 2017

An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
rabbitmq-server
Launchpad, Ubuntu, Debian
artful Not vulnerable
(3.6.10-1)
bionic Not vulnerable
(3.6.10-1)
cosmic Not vulnerable
(3.6.10-1)
disco Not vulnerable
(3.6.10-1)
eoan Not vulnerable
(3.6.10-1)
focal Not vulnerable
(3.6.10-1)
groovy Not vulnerable
(3.6.10-1)
hirsute Not vulnerable
(3.6.10-1)
impish Not vulnerable
(3.6.10-1)
jammy Not vulnerable
(3.6.10-1)
kinetic Not vulnerable
(3.6.10-1)
precise Does not exist
(precise was not-affected)
trusty Does not exist
(trusty was not-affected)
upstream
Released (3.6.9)
xenial Needed

yakkety Ignored
(reached end-of-life)
zesty Ignored
(reached end-of-life)
Patches:
upstream: https://github.com/rabbitmq/rabbitmq-management/commit/2371633f99ad0d293899384f078872ff9e9f3e10