Description
|
|
Some vulnerabilities have been reported in RabbitMQ, which can be exploited by malicious people to conduct HTTP response splitting and cross-site scripting attacks.
1) Input appended to the URL after /api/ is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers, which will be included in a response sent to the user.
The vulnerabilities are reported in versions prior to 3.4.1.
|