rabbitmq-server: CVE-2021-32719 CVE-2021-32718

Related Vulnerabilities: CVE-2021-32719   CVE-2021-32718  

Debian Bug report logs - #990524
rabbitmq-server: CVE-2021-32719 CVE-2021-32718

version graph

Reported by: Moritz Mühlenhoff <jmm@inutil.org>

Date: Thu, 1 Jul 2021 11:24:04 UTC

Severity: important

Tags: security, upstream

Found in version rabbitmq-server/3.8.9-3

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, Debian OpenStack <team+openstack@tracker.debian.org>:
Bug#990524; Package src:rabbitmq-server. (Thu, 01 Jul 2021 11:24:05 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Mühlenhoff <jmm@inutil.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Debian OpenStack <team+openstack@tracker.debian.org>. (Thu, 01 Jul 2021 11:24:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Moritz Mühlenhoff <jmm@inutil.org>
To: submit@bugs.debian.org
Subject: rabbitmq-server: CVE-2021-32719 CVE-2021-32718
Date: Thu, 1 Jul 2021 13:22:12 +0200
Source: rabbitmq-server
X-Debbugs-CC: team@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for rabbitmq-server.

CVE-2021-32719[0]:
| RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server
| prior to version 3.8.18, when a federation link was displayed in the
| RabbitMQ management UI via the `rabbitmq_federation_management`
| plugin, its consumer tag was rendered without proper &lt;script&gt;
| tag sanitization. This potentially allows for JavaScript code
| execution in the context of the page. The user must be signed in and
| have elevated permissions (manage federation upstreams and policies)
| for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As
| a workaround, disable the `rabbitmq_federation_management` plugin and
| use [CLI tools](https://www.rabbitmq.com/cli.html) instead.

https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x
https://github.com/rabbitmq/rabbitmq-server/pull/3122

CVE-2021-32718[1]:
| RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server
| prior to version 3.8.17, a new user being added via management UI
| could lead to the user's bane being rendered in a confirmation message
| without proper `&lt;script&gt;` tag sanitization, potentially allowing
| for JavaScript code execution in the context of the page. In order for
| this to occur, the user must be signed in and have elevated
| permissions (other user management). The vulnerability is patched in
| RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin
| and use CLI tools for management operations and Prometheus and Grafana
| for metrics and monitoring.

https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-c3hj-rg5h-2772
https://github.com/rabbitmq/rabbitmq-server/pull/3028

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-32719
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32719
[1] https://security-tracker.debian.org/tracker/CVE-2021-32718
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32718

Please adjust the affected versions in the BTS as needed.



Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 01 Jul 2021 13:12:02 GMT) (full text, mbox, link).


Marked as found in versions rabbitmq-server/3.8.9-3. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 01 Jul 2021 13:12:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Thu Jul 1 16:15:47 2021; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.