Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32718
HistoryJun 28, 2021 - 12:00 a.m.

CVE-2021-32718

2021-06-2800:00:00
ubuntu.com
ubuntu.com
19
rabbitmq
user management
security vulnerability
patched version
cli tools
prometheus
grafana

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

40.6%

RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to
version 3.8.17, a new user being added via management UI could lead to the
user’s bane being rendered in a confirmation message without proper
<script> tag sanitization, potentially allowing for JavaScript code
execution in the context of the page. In order for this to occur, the user
must be signed in and have elevated permissions (other user management).
The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable
rabbitmq_management plugin and use CLI tools for management operations
and Prometheus and Grafana for metrics and monitoring.

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

40.6%