MEDIUM · 4.8

CVE-2019-11281

Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the v...

Vulnerability Description

Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.

CVSS Score

4.8

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
Pivotal SoftwareRabbitmq< 3.7.18
RedhatOpenstack15
RedhatOpenstack For Ibm Power15
DebianDebian Linux9.0
FedoraprojectFedora30

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-11281?

CVE-2019-11281 is a vulnerability with a CVSS score of 4.8 (MEDIUM). Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the v...

How severe is CVE-2019-11281?

CVE-2019-11281 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-11281?

Check the references section above for vendor advisories and patch information. Affected products include: Pivotal Software Rabbitmq, Redhat Openstack, Redhat Openstack For Ibm Power, Debian Debian Linux, Fedoraproject Fedora.