RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
References
Link | Resource |
---|---|
https://tanzu.vmware.com/security/cve-2020-5419 | Vendor Advisory |
https://tanzu.vmware.com/security/cve-2020-5419 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
02 Apr 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:* | |
First Time |
Broadcom rabbitmq Server
Broadcom |
Information
Published : 2020-08-31 15:15
Updated : 2025-04-02 14:13
NVD link : CVE-2020-5419
Mitre link : CVE-2020-5419
CVE.ORG link : CVE-2020-5419
JSON object : View
Products Affected
broadcom
- rabbitmq_server
pivotal_software
- rabbitmq
CWE
CWE-427
Uncontrolled Search Path Element