QID 375663

Date Published: 2021-06-30

QID 375663: RabbitMQ Server Cross-Site Scripting Vulnerability (Zero day)

RabbitMQ is an open source message broker software (sometimes called message-oriented middleware) that originally implemented the Advanced Message Queuing Protocol (AMQP) and has since been extended with a plug-in architecture to support Streaming Text Oriented Messaging Protocol (STOMP), Message Queuing Telemetry Transport (MQTT), and other protocols.

CVE-2021-32719 - When a federation link was displayed in the RabbitMQ management UI via the rabbitmq_federation_management plugin, its consumer tag was rendered without proper script tag sanitization, potentially allowing for JavaScript code execution in the context of the page.

QID Detection Logic:(Authenticated)
On Microsoft Windows systems, the HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RabbitMQ registry key is parsed to check for vulnerable versions of rabbitmq.

Successful exploitation of this vulnerability may allow an attacker to execute remote code and disclose sensitive information.

  • CVSS V3 rated as Medium - 4.8 severity.
  • CVSS V2 rated as Medium - 3.5 severity.
  • Solution
    The customers are advised to upgrade to rabbitmq version 3.8.18 or later.
    More information can be found here.

    Workaround:
    Disable the rabbitmq_federation_management plugin and use CLI tools instead.

    Vendor References

    CVEs related to QID 375663

    Software Advisories
    Advisory ID Software Component Link
    RabbitMQ v3.8.18 URL Logo www.rabbitmq.com/download.html