QID 375663
Date Published: 2021-06-30
QID 375663: RabbitMQ Server Cross-Site Scripting Vulnerability (Zero day)
RabbitMQ is an open source message broker software (sometimes called message-oriented middleware) that originally implemented the Advanced Message Queuing Protocol (AMQP) and has since been extended with a plug-in architecture to support Streaming Text Oriented Messaging Protocol (STOMP), Message Queuing Telemetry Transport (MQTT), and other protocols.
CVE-2021-32719 - When a federation link was displayed in the RabbitMQ management UI via the rabbitmq_federation_management plugin, its consumer tag was rendered without proper script tag sanitization, potentially allowing for JavaScript code execution in the context of the page.
QID Detection Logic:(Authenticated)
On Microsoft Windows systems, the HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RabbitMQ registry key is parsed to check for vulnerable versions of rabbitmq.
Successful exploitation of this vulnerability may allow an attacker to execute remote code and disclose sensitive information.
More information can be found here.
Workaround:
Disable the rabbitmq_federation_management plugin and use CLI tools instead.
- RabbitMQ v3.8.18 -
github.com/rabbitmq/rabbitmq-server/releases/tag/v3.8.18
CVEs related to QID 375663
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RabbitMQ v3.8.18 |
|