Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 02 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Broadcom Broadcom rabbitmq Server | |
| CPEs | cpe:2.3:a:vmware:rabbitmq:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.6:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:2.8.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* | cpe:2.3:a:broadcom:rabbitmq_server:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.5.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.6:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:2.8.7:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:* | 
| Vendors & Products | Vmware Vmware rabbitmq | Broadcom Broadcom rabbitmq Server | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: canonical
Published: 2015-01-27T17:00:00
Updated: 2024-08-06T13:47:41.729Z
Reserved: 2015-01-27T00:00:00
Link: CVE-2014-9649
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Deferred
Published: 2015-01-27T20:02:39.637
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-9649
 Redhat
                        Redhat