RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html | Mailing List Third Party Advisory |
https://tanzu.vmware.com/security/cve-2021-22116 | Vendor Advisory |
Configurations
History
04 Jun 2022, 02:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
16 Jun 2021, 12:38
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 7.5 |
CPE | cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:* | |
CWE | CWE-20 | |
References | (MISC) https://tanzu.vmware.com/security/cve-2021-22116 - Vendor Advisory |
08 Jun 2021, 13:53
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-08 12:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-22116
Mitre link : CVE-2021-22116
CVE.ORG link : CVE-2021-22116
JSON object : View
Products Affected
vmware
- rabbitmq
debian
- debian_linux