Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.
History

Wed, 02 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Broadcom
Broadcom rabbitmq Server
CPEs cpe:2.3:a:vmware:rabbitmq:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*
Vendors & Products Vmware
Vmware rabbitmq
Broadcom
Broadcom rabbitmq Server

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-08-06T13:47:41.729Z

Reserved: 2015-01-27T00:00:00

Link: CVE-2014-9649

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2015-01-27T20:02:39.637

Modified: 2025-04-02T14:13:43.180

Link: CVE-2014-9649

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-10-29T00:00:00Z

Links: CVE-2014-9649 - Bugzilla