CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.
History

Wed, 02 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Broadcom
Broadcom rabbitmq Server
CPEs cpe:2.3:a:vmware:rabbitmq:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:*
Vendors & Products Vmware
Vmware rabbitmq
Broadcom
Broadcom rabbitmq Server

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-08-06T13:47:41.815Z

Reserved: 2015-01-27T00:00:00

Link: CVE-2014-9650

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2015-01-27T20:03:15.080

Modified: 2025-04-02T14:13:43.180

Link: CVE-2014-9650

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-10-29T00:00:00Z

Links: CVE-2014-9650 - Bugzilla