Bug 1783327 (CVE-2019-11291) - CVE-2019-11291 rabbitmq-server: not properly sanitized user input may lead to XSS
Summary: CVE-2019-11291 rabbitmq-server: not properly sanitized user input may lead to...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-11291
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1783328 1783329 1786019 1786020 1786021 1786022 1786023
Blocks: 1783331
TreeView+ depends on / blocked
 
Reported: 2019-12-13 15:05 UTC by Marian Rehak
Modified: 2021-02-16 20:52 UTC (History)
29 users (show)

Fixed In Version: rabbitmq-server 3.7.20, rabbitmq-server 3.8.1
Clone Of:
Environment:
Last Closed: 2020-02-19 20:09:35 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:0553 0 None None None 2020-02-19 16:03:11 UTC

Description Marian Rehak 2019-12-13 15:05:00 UTC
Two endpoints, federation and shovel, do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

Comment 1 Marian Rehak 2019-12-13 15:05:16 UTC
Created rabbitmq-server tracking bugs for this issue:

Affects: fedora-all [bug 1783329]
Affects: openstack-rdo [bug 1783328]

Comment 6 Summer Long 2020-01-06 05:54:32 UTC
External References:

https://pivotal.io/security/cve-2019-11291

Comment 7 errata-xmlrpc 2020-02-19 16:03:09 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 15.0 (Stein)

Via RHSA-2020:0553 https://access.redhat.com/errata/RHSA-2020:0553

Comment 8 Product Security DevOps Team 2020-02-19 20:09:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-11291


Note You need to log in before you can comment on or make changes to this bug.