CVE-2017-4966

CVSS V2 Low 2.1 CVSS V3 High 7.8
Description
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
Overview
  • CVE ID
  • CVE-2017-4966
  • Assigner
  • security_alert@emc.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2017-06-13T06:29:00
  • Last Modified Date
  • 2022-05-15T14:13:59
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:pivotal_software:rabbitmq:3.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:3.6.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:rabbitmq:3.6.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.0:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.1:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.2:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.3:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.4:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.5:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.6:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.7:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.8:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.9:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.10:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.11:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.12:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.13:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.14:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.15:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.17:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.18:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.5.19:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.0:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.1:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.2:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.3:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.4:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.5:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.6:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.7:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.8:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.9:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.10:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.12:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.13:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.14:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.15:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.6.16:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.0:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.2:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.3:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.4:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.5:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.6:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.7:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.8:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.9:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.10:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.13:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:a:pivotal_software:rabbitmq:1.7.14:*:*:*:*:pivotal_cloud_foundry:*:* 1 OR
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 2.1
  • Severity
  • LOW
  • Exploitability Score
  • 3.9
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.8
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-05-10 15:45:37 Added to TrackCVE
2022-12-02 17:41:12 secure@dell.com security_alert@emc.com CVE Assigner updated
2022-12-02 17:41:12 2017-06-13T06:29Z 2017-06-13T06:29:00 CVE Published Date updated
2022-12-02 17:41:12 2022-05-15T14:13:59 CVE Modified Date updated
2022-12-02 17:41:12 Analyzed Vulnerability Status updated