CVE-2014-9650
Published: 27 January 2015
CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions.
Priority
Status
Package | Release | Status |
---|---|---|
rabbitmq-server Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(3.4.2-2)
|
bionic |
Not vulnerable
(3.4.2-2)
|
|
cosmic |
Not vulnerable
(3.4.2-2)
|
|
disco |
Not vulnerable
(3.4.2-2)
|
|
lucid |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(3.4.2)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Not vulnerable
(3.4.2-2)
|
|
wily |
Not vulnerable
(3.4.2-2)
|
|
xenial |
Not vulnerable
(3.4.2-2)
|
|
yakkety |
Not vulnerable
(3.4.2-2)
|
|
zesty |
Not vulnerable
(3.4.2-2)
|
|
Patches: upstream: https://github.com/rabbitmq/rabbitmq-management/commit/b5a5fc31bd49ad821a655ea9e2fe920d670a62ad |