Debian DLA-2710-1 : rabbitmq-server - LTS security update

high Nessus Plugin ID 152075

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 9 host has a package installed that is affected by multiple vulnerabilities as referenced in the dla-2710 advisory.

- An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks. (CVE-2017-4965, CVE-2017-4967)

- An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack. (CVE-2017-4966)

- Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information. (CVE-2019-11281)

- Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The X-Reason HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing. (CVE-2019-11287)

- RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.
(CVE-2021-22116)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade the rabbitmq-server packages.

For Debian 9 stretch, these problems have been fixed in version 3.6.6-1+deb9u1.

See Also

http://www.nessus.org/u?e0a75fd6

https://www.debian.org/lts/security/2021/dla-2710

https://security-tracker.debian.org/tracker/CVE-2017-4965

https://security-tracker.debian.org/tracker/CVE-2017-4966

https://security-tracker.debian.org/tracker/CVE-2017-4967

https://security-tracker.debian.org/tracker/CVE-2019-11281

https://security-tracker.debian.org/tracker/CVE-2019-11287

https://security-tracker.debian.org/tracker/CVE-2021-22116

https://packages.debian.org/source/stretch/rabbitmq-server

Plugin Details

Severity: High

ID: 152075

File Name: debian_DLA-2710.nasl

Version: 1.5

Type: local

Agent: unix

Published: 7/26/2021

Updated: 12/6/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2017-4967

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2017-4966

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:rabbitmq-server, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/26/2021

Vulnerability Publication Date: 5/4/2017

Reference Information

CVE: CVE-2017-4965, CVE-2017-4966, CVE-2017-4967, CVE-2019-11281, CVE-2019-11287, CVE-2021-22116

IAVB: 2017-B-0057-S, 2021-B-0029-S