Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-9459 | Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 02 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom rabbitmq Server |
|
| CPEs | cpe:2.3:a:vmware:rabbitmq:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.6:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:rabbitmq_server:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.5.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.6:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.7:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:* |
| Vendors & Products |
Vmware
Vmware rabbitmq |
Broadcom
Broadcom rabbitmq Server |
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-08-06T13:47:41.729Z
Reserved: 2015-01-27T00:00:00
Link: CVE-2014-9649
No data.
Status : Deferred
Published: 2015-01-27T20:02:39.637
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-9649
OpenCVE Enrichment
No data.
EUVD