An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
02 Apr 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Broadcom rabbitmq Server
Broadcom |
|
CPE | cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.3:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:* |
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3761 - | |
References | () http://www.securityfocus.com/bid/95065 - | |
References | () https://pivotal.io/security/cve-2016-9877 - Mitigation, Vendor Advisory | |
References | () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us - |
17 Mar 2022, 14:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pivotal_software:rabbitmq:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.5.6:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.5.1:*:*:*:*:*:*:* |
cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.6:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.2:*:*:*:*:*:*:* |
17 Mar 2022, 13:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pivotal_software:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:pivotal_software:rabbitmq:3.0.4:*:*:*:*:*:*:* |
cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.0:*:*:*:*:*:*:* |
Information
Published : 2016-12-29 09:59
Updated : 2025-04-02 14:13
NVD link : CVE-2016-9877
Mitre link : CVE-2016-9877
CVE.ORG link : CVE-2016-9877
JSON object : View
Products Affected
pivotal_software
- rabbitmq
broadcom
- rabbitmq_server
CWE
CWE-284
Improper Access Control