drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in RabbitMQ
| Name: |
Cross-Site Scripting in RabbitMQ |
|
| ID: |
USN-7399-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
| Datum: |
Mo, 31. März 2025, 23:22 |
|
| Referenzen: |
https://launchpad.net/ubuntu/+source/rabbitmq-server/3.9.27-0ubuntu0.2
https://www.cve.org/CVERecord?id=CVE-2025-30219
https://launchpad.net/ubuntu/+source/rabbitmq-server/3.12.1-1ubuntu1.2
https://launchpad.net/ubuntu/+source/rabbitmq-server/3.12.1-1ubuntu2.1
https://launchpad.net/ubuntu/+source/rabbitmq-server/3.8.3-0ubuntu0.3 |
|
| Applikationen: |
RabbitMQ |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6537859845197739085== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------br20IAti0vrGczdgq7EUN7Yi"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------br20IAti0vrGczdgq7EUN7Yi Content-Type: multipart/mixed; boundary="------------9otZj9LqA1c918sr9bYQG59J"; protected-headers="v1" From: Fabian Toepfer <fabian.toepfer@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <3fafa79a-81f0-4a08-885e-3c639e452069@canonical.com> Subject: [USN-7399-1] RabbitMQ Server vulnerability
--------------9otZj9LqA1c918sr9bYQG59J Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7399-1 March 31, 2025
rabbitmq-server vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS
Summary:
RabbitMQ Server's management UI could be made to run code via cross-site scripting (XSS).
Software Description: - rabbitmq-server: AMQP server written in Erlang
Details:
It was discovered that RabbitMQ Server's management UI did not sanitize certain input. An attacker could possibly use this issue to inject code by performing a cross-site scripting (XSS) attack.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 rabbitmq-server 3.12.1-1ubuntu2.1
Ubuntu 24.04 LTS rabbitmq-server 3.12.1-1ubuntu1.2
Ubuntu 22.04 LTS rabbitmq-server 3.9.27-0ubuntu0.2
Ubuntu 20.04 LTS rabbitmq-server 3.8.3-0ubuntu0.3
After a standard system update you need to restart RabbitMQ Server to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7399-1 CVE-2025-30219
Package Information: https://launchpad.net/ubuntu/+source/rabbitmq-server/3.12.1-1ubuntu2.1 https://launchpad.net/ubuntu/+source/rabbitmq-server/3.12.1-1ubuntu1.2 https://launchpad.net/ubuntu/+source/rabbitmq-server/3.9.27-0ubuntu0.2 https://launchpad.net/ubuntu/+source/rabbitmq-server/3.8.3-0ubuntu0.3
--------------9otZj9LqA1c918sr9bYQG59J--
--------------br20IAti0vrGczdgq7EUN7Yi Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEE2WgtvmwmcgaEBLlnCAvK1QvD6SAFAmfq31oFAwAAAAAACgkQCAvK1QvD6SCi QxAAvNydvDar9NW/K1vbgxcdxNT/geLo5cFAbsZrVFqkUif2qYnZSz9JSG+G5eRyFJDlPpTFmVB1 ao3aCq1R2LPkjb2bV0ZNrSdoER9LkXs9pFzEMUwrrreUbk60JKwH/O+B+SU2YxTWIV2ynvQHZWID ehfB4yAv2+1nH8TZwyBw5lE1UPyDxNfoUdYM3IdW/UciQY20SqeN8esd4cGRb4Z/aiqha+4qsCDm WcsUNzCVCMzY/XQG/GldB/9xkx6vq+SgZJY3Lk4caILw1vfmKIfVP9g+gPkhIviir9jgbWHr3XOh Ov0NZL1RWyZGgxemKia8CIcqHmsV5C9VehyyG7jooYt1MNeGLnrE1XYizW82zUy/BgzDkum0WxOv F77ryLCnXqxNLmdXw51peQbglmcHlUZESCGMfVxlduVSFkgEIBimFSIAS2SNvUfkkxIURl2nqzNw fcjwkUlfmbYoQQ+1BKtXmtbP+462y9kgE1W4dluCgI/HAW7wT+tEq9wrBm+R0F+6dyh0eyt98/vz VwKbejtLIgkKR6WUfLaBiUUDY4P6NZ65qpgGsFsoXNkjVxyndg0hJwWD76UtlwNmyuUw/lNWSeM7 gObQPwqSwLM8ejd5LiCVYj6E/rx++QwZCrGC65CY1IX3XF93Okt+hae87Y/6pmVfty0vT4Tcq3Mv CXA= =D5vG -----END PGP SIGNATURE-----
--------------br20IAti0vrGczdgq7EUN7Yi--
--===============6537859845197739085== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============6537859845197739085==--
|
|
|
|