CVE-2017-4965

CVSS V2 Medium 4.3 CVSS V3 Medium 6.1
Description
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
Overview
  • CVE ID
  • CVE-2017-4965
  • Assigner
  • security_alert@emc.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2017-06-13T06:29:00
  • Last Modified Date
  • 2022-05-15T14:13:11
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:pivotal_software:rabbitmq:3.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.6.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.0:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.1:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.2:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.3:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.4:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.5:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.6:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.7:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.8:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.9:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.10:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.11:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.12:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.13:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.14:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.15:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.17:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.18:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.19:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.0:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.1:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.2:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.3:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.4:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.5:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.6:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.7:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.8:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.9:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.10:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.12:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.13:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.14:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.15:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.16:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.0:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.2:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.3:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.4:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.5:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.6:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.7:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.8:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.9:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.10:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.13:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.14:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • CHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 6.1
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.8
  • Impact Score
  • 2.7
References
History
Created Old Value New Value Data Type Notes
2022-05-10 15:45:37 Added to TrackCVE
2022-12-02 17:41:09 secure@dell.com security_alert@emc.com CVE Assigner updated
2022-12-02 17:41:09 2017-06-13T06:29Z 2017-06-13T06:29:00 CVE Published Date updated
2022-12-02 17:41:09 2022-05-15T14:13:11 CVE Modified Date updated
2022-12-02 17:41:09 Analyzed Vulnerability Status updated