CVE-2023-46118

Source
https://cve.org/CVERecord?id=CVE-2023-46118
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46118.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-46118
Aliases
Downstream
Related
Published
2023-10-24T23:27:06.952Z
Modified
2026-02-05T04:33:27.229062Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of Service by publishing large messages over the HTTP API
Details

RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an "out-of-memory killer"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46118.json",
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Git / github.com/rabbitmq/rabbitmq-server

Affected ranges

Type
GIT
Repo
https://github.com/rabbitmq/rabbitmq-server
Events

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46118.json"