The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of RabbitMQ

vulnerability CVE-2019-11358

jQuery Core: privilege escalation via Object.prototype Pollution

Synthesis of the vulnerability

An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges.
Impacted products: Debian, Drupal Core, eZ Platform, Fedora, jQuery Core, SnapCenter Backup Management, openSUSE Leap, Oracle Communications, WebLogic, RabbitMQ, Red Hat SSO, SLES, Synology DSM, Telerik.Web.UI.
Severity: 2/4.
Consequences: user access/rights, data reading.
Provenance: document.
Creation date: 11/04/2019.
Identifiers: cpujul2019, CVE-2019-11358, DLA-1797-1, DRUPAL-SA-CORE-2019-005, DRUPAL-SA-CORE-2019-006, DSA-4460-1, EZSA-2019-005, FEDORA-2019-2a0ce0c58c, FEDORA-2019-a06dffab1c, FEDORA-2019-f563e66380, NTAP-20190919-0001, openSUSE-SU-2019:1839-1, openSUSE-SU-2019:1872-1, RHSA-2019:1456-01, Synology-SA-19:19, VIGILANCE-VUL-29030.

Description of the vulnerability

An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-1279

RabbitMQ: privilege escalation via Predictable Cluster Shared Erlang/OTP Cookie

Synthesis of the vulnerability

An attacker can bypass restrictions via Cluster Shared Erlang/OTP Cookie of RabbitMQ, in order to escalate his privileges.
Impacted products: RabbitMQ.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights, data creation/edition.
Provenance: intranet client.
Creation date: 06/12/2018.
Identifiers: CVE-2018-1279, VIGILANCE-VUL-27973.

Description of the vulnerability

An attacker can bypass restrictions via Cluster Shared Erlang/OTP Cookie of RabbitMQ, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note 24749

TLS: information disclosure via ROBOT Attack

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via ROBOT Attack of TLS, in order to obtain sensitive information.
Impacted products: Bouncy Castle JCE, Cisco ACE, BIG-IP Hardware, TMOS, Mule ESB, Java OpenJDK, Java Oracle, Palo Alto Firewall PA***, PAN-OS, RabbitMQ, Unix (platform) ~ not comprehensive.
Severity: 1/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 13/12/2017.
Identifiers: CERTFR-2017-ALE-020, cisco-sa-20171212-bleichenbacher, CSCvg74693, CTX230238, K21905460, PAN-SA-2017-0032, ROBOT Attack, VIGILANCE-VUL-24749, VU#144389.

Description of the vulnerability

An attacker can bypass access restrictions to data via ROBOT Attack of TLS, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2017-4965 CVE-2017-4967

RabbitMQ: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of RabbitMQ.
Impacted products: Solaris, RabbitMQ.
Severity: 2/4.
Consequences: user access/rights, client access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 14/06/2017.
Identifiers: bulletinapr2017, CVE-2017-4965, CVE-2017-4967, VIGILANCE-VUL-22976.

Description of the vulnerability

Several vulnerabilities were announced in RabbitMQ.

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2017-4965, CVE-2017-4967]

An attacker can retrieve credentials in the browser storage area which is managed by the Web application. [severity:2/4]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2015-9251

Node.js jquery: Cross Site Scripting via Ajax request

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via Ajax requests in Node.js jquery, in order to run JavaScript code in the context of the web site.
Impacted products: Nodejs Modules ~ not comprehensive, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, RabbitMQ.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 22/03/2017.
Identifiers: bulletinjul2018, cpuapr2019, cpujan2019, cpuoct2018, CVE-2015-9251, CVE-2017-16012-REJECT, VIGILANCE-VUL-22215.

Description of the vulnerability

An attacker can trigger a Cross Site Scripting via Ajax requests in Node.js jquery, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2015-9251

jQuery: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of jQuery, in order to run JavaScript code in the context of the web site.
Impacted products: Fedora, jQuery Core, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, RabbitMQ, Zabbix.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 29/12/2016.
Identifiers: bulletinjul2018, cpuapr2019, cpujan2019, cpujul2019, cpuoct2018, CVE-2015-9251, FEDORA-2016-06e8a3f776, FEDORA-2016-3368a38282, FEDORA-2016-8516b7d6fb, FEDORA-2016-b6cb3e83fa, VIGILANCE-VUL-21468.

Description of the vulnerability

The jQuery product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of jQuery, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about RabbitMQ: