RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-26588 | RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://tanzu.vmware.com/security/cve-2020-5419 |
|
History
Wed, 02 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom rabbitmq Server |
|
| CPEs | cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware
Vmware rabbitmq |
Broadcom
Broadcom rabbitmq Server |
Status: PUBLISHED
Assigner: pivotal
Published:
Updated: 2024-09-16T23:31:18.810Z
Reserved: 2020-01-03T00:00:00
Link: CVE-2020-5419
No data.
Status : Modified
Published: 2020-08-31T15:15:11.010
Modified: 2025-04-02T14:13:43.180
Link: CVE-2020-5419
No data.
OpenCVE Enrichment
No data.
EUVD