Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.
References
Configurations
Configuration 1 (hide)
|
History
02 Apr 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Broadcom rabbitmq Server
Broadcom |
|
CPE | cpe:2.3:a:vmware:rabbitmq:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.6:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.3.1:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:rabbitmq_server:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.5.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.6:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.7:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:* |
Information
Published : 2015-01-27 20:02
Updated : 2025-04-12 10:46
NVD link : CVE-2014-9649
Mitre link : CVE-2014-9649
CVE.ORG link : CVE-2014-9649
JSON object : View
Products Affected
broadcom
- rabbitmq_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')