Lucene search

K
cvelistPivotalCVELIST:CVE-2020-5419
HistoryAug 31, 2020 - 3:05 p.m.

CVE-2020-5419 RabbitMQ arbitrary code execution using local binary planting

2020-08-3115:05:20
CWE-427
pivotal
www.cve.org
5

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

12.6%

RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.

CNA Affected

[
  {
    "product": "RabbitMQ",
    "vendor": "VMware Tanzu",
    "versions": [
      {
        "lessThan": "3.7.28",
        "status": "affected",
        "version": "3.7",
        "versionType": "custom"
      },
      {
        "lessThan": "3.8.7",
        "status": "affected",
        "version": "3.8",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

12.6%

Related for CVELIST:CVE-2020-5419