CVE-2021-32719
Publication date 28 June 2021
Last updated 9 December 2024
Ubuntu priority
Cvss 3 Severity Score
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper <script> tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.
Status
Package | Ubuntu Release | Status |
---|---|---|
rabbitmq-server | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Fixed 3.8.3-0ubuntu0.2
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release |
Patch details
Package | Patch details |
---|---|
rabbitmq-server |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.8 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | High |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-7143-1
- RabbitMQ Server vulnerabilities
- 9 December 2024