USN-7143-1

Source
https://ubuntu.com/security/notices/USN-7143-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7143-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7143-1
Related
Published
2024-12-09T14:37:21.879730Z
Modified
2024-12-09T14:37:21.879730Z
Summary
rabbitmq-server vulnerabilities
Details

Christian Rellmann discovered that RabbitMQ Server did not properly sanitize user input when adding a new user via the management UI. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. (CVE-2021-32718)

Fahimhusain Raydurg discovered that RabbitMQ Server did not properly sanitize user input when using the federation management plugin. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. (CVE-2021-32719)

References

Affected packages

Ubuntu:20.04:LTS / rabbitmq-server

Package

Name
rabbitmq-server
Purl
pkg:deb/ubuntu/rabbitmq-server?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.3-0ubuntu0.2

Affected versions

3.*

3.7.8-4ubuntu2
3.7.18-1
3.8.2-0ubuntu1
3.8.2-0ubuntu1.1
3.8.2-0ubuntu1.2
3.8.2-0ubuntu1.3
3.8.2-0ubuntu1.4
3.8.2-0ubuntu1.5
3.8.3-0ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.8.3-0ubuntu0.2",
            "binary_name": "rabbitmq-server"
        }
    ]
}