{"api_version":"1","generated_at":"2026-04-13T19:51:36+00:00","cve":"CVE-2023-46118","urls":{"html":"https://cve.report/CVE-2023-46118","api":"https://cve.report/api/cve/CVE-2023-46118.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-46118","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-46118"},"summary":{"title":"CVE-2023-46118","description":"RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an \"out-of-memory killer\"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-10-25 18:17:00","updated_at":"2023-12-02 01:15:00"},"problem_types":["CWE-400"],"metrics":[],"references":[{"url":"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg","name":"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg","refsource":"MISC","tags":[],"title":"Denial of Service by publishing large messages over the HTTP API · Advisory · rabbitmq/rabbitmq-server · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5571","name":"https://www.debian.org/security/2023/dsa-5571","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-46118","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46118","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"46118","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vmware","cpe5":"rabbitmq","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-46118","qid":"199939","title":"Ubuntu Security Notification for RabbitMQ Vulnerability (USN-6501-1)"},{"cve":"CVE-2023-46118","qid":"242869","title":"Red Hat Update for OpenStack Platform 17.1 (RHSA-2024:0217)"},{"cve":"CVE-2023-46118","qid":"6000369","title":"Debian Security Update for rabbitmq-server (DSA 5571-1)"},{"cve":"CVE-2023-46118","qid":"6000382","title":"Debian Security Update for rabbitmq-server (DLA 3687-1)"},{"cve":"CVE-2023-46118","qid":"755511","title":"SUSE Enterprise Linux Security Update for rabbitmq-server (SUSE-SU-2023:4939-1)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-46118","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an \"out-of-memory killer\"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-400: Uncontrolled Resource Consumption","cweId":"CWE-400"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"rabbitmq","product":{"product_data":[{"product_name":"rabbitmq-server","version":{"version_data":[{"version_affected":"=","version_value":"< 3.12.7"},{"version_affected":"=","version_value":"< 3.11.24"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg","refsource":"MISC","name":"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg"}]},"source":{"advisory":"GHSA-w6cq-9cf4-gqpg","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-25 18:17:00","lastModifiedDate":"2023-12-02 01:15:00","problem_types":["CWE-400"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12.0","versionEndExcluding":"3.12.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*","versionEndExcluding":"3.11.24","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}