RabbitMQ arbitrary code execution using local binary planting
CVE-2020-5419
6.7MEDIUM
Key Information:
- Vendor
- Vmware Tanzu
- Status
- RabbitMQ
- Vendor
- CVE Published:
- 31 August 2020
Summary
RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
Affected Version(s)
RabbitMQ 3.7 < 3.7.28
RabbitMQ 3.8 < 3.8.7
References
CVSS V3.1
Score:
6.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved