CVE-2017-4966
Severity:
HIGH
Type:
CWE-200
Information Leak / Disclosure
Publication date:
13/06/2017
Last modified:
15/05/2022
Description
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
2.10
Severity 2.0
Low
Vulnerable products and versions
- cpe:2.3:a:pivotal_software:rabbitmq:3.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:rabbitmq:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:rabbitmq:3.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:rabbitmq:3.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:rabbitmq:3.6.1:*:*:*:*:*:*:*
To consult the complete list of products and versions see this page
References to Advisories, Solutions, and Tools
- https://pivotal.io/security/cve-2017-4966 (Source:CONFIRM)
- https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html (Source:MLIST)