Severity |
|
Remote |
|
Type |
- |
Unknown |
+ |
Cross-site scripting |
|
Description |
+ |
In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the rabbitmq_federation_management plugin, its consumer tag was rendered without proper <script> tag sanitization, potentially allowing for JavaScript code execution in the context of the page. |
+ |
|
+ |
As a workaround, disable the rabbitmq_management plugin and use CLI tools instead. |
|
References |
+ |
https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x |
+ |
https://github.com/rabbitmq/rabbitmq-server/pull/3122 |
+ |
https://github.com/rabbitmq/rabbitmq-server/commit/08beb82e9ab8923ded88ece2800cd80971e2bd05 |
|
Notes |
+ |
Workaround |
+ |
========== |
+ |
|
+ |
As a workaround, disable the rabbitmq_management plugin and use CLI tools instead. |
|