RabbitMQ arbitrary code execution using local binary planting
CVE-2020-5419

6.7MEDIUM

Key Information:

Vendor
Vmware Tanzu
Status
RabbitMQ
Vendor
CVE Published:
31 August 2020

Summary

RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.

Affected Version(s)

RabbitMQ 3.7 < 3.7.28

RabbitMQ 3.8 < 3.8.7

References

CVSS V3.1

Score:
6.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.