// For flags

CVE-2021-32719

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in RabbitMQ federation management plugin

Severity Score

4.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper <script> tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.

RabbitMQ es un broker de mensajería multiprotocolo. En rabbitmq-server versiones anteriores a 3.8.18, cuando un enlace de federación es mostrado en la Interfaz de Usuario de administración de RabbitMQ por medio del plugin "rabbitmq_federation_management", su etiqueta consumer se mostraba sin el saneamiento apropiado de la etiqueta (script). Esto permite potencialmente una ejecución de código JavaScript en el contexto de la página. El usuario debe haber iniciado sesión y tener permisos elevados (gestionar flujos ascendentes y políticas de federación) para que esto ocurra. La vulnerabilidad está parcheada en RabbitMQ versión 3.8.18. Como solución alternativa, desactivar el plugin "rabbitmq_federation_management" y usar [CLI tools](https://www.rabbitmq.com/cli.html) en su lugar

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-06-28 CVE Published
  • 2023-03-18 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Rabbitmq
Search vendor "Vmware" for product "Rabbitmq"
< 3.8.18
Search vendor "Vmware" for product "Rabbitmq" and version " < 3.8.18"
-
Affected