Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32719
HistoryJun 28, 2021 - 12:00 a.m.

CVE-2021-32719

2021-06-2800:00:00
ubuntu.com
ubuntu.com
25
rabbitmq
federation link
ui vulnerability
javascript execution
page context
elevated permissions
manage federation
rabbitmq 3.8.18
cli tools
unix

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

40.6%

RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to
version 3.8.18, when a federation link was displayed in the RabbitMQ
management UI via the rabbitmq_federation_management plugin, its consumer
tag was rendered without proper <script> tag sanitization. This potentially
allows for JavaScript code execution in the context of the page. The user
must be signed in and have elevated permissions (manage federation
upstreams and policies) for this to occur. The vulnerability is patched in
RabbitMQ 3.8.18. As a workaround, disable the
rabbitmq_federation_management plugin and use CLI
tools
instead.

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

40.6%