logo

CVE-2024-51988 rabbit_common

Package

Manager: erlang
Name: rabbit_common
Vulnerable Version: >=3.12.7 <3.12.11

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00101 pctl0.28547

Details

RabbitMQ HTTP API's queue deletion endpoint does not verify that the user has a required permission ### Summary Queue deletion via the HTTP API was not verifying the `configure` permission of the user. ### Impact Users who had all of the following: 1. Valid credentials 2. Some permissions for the target virtual host 3. HTTP API access could delete queues it had no (deletion) permissions for. ### Workarounds Disable management plugin and use, for example, [Prometheus and Grafana](https://www.rabbitmq.com/docs/prometheus) for monitoring. ### OWASP Classification OWASP Top10 A01:2021 – Broken Access Control

Metadata

Created: 2024-11-06T19:55:13Z
Modified: 2024-11-06T23:38:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-pj33-75x5-32j4/GHSA-pj33-75x5-32j4.json
CWE IDs: ["CWE-284"]
Alternative ID: GHSA-pj33-75x5-32j4
Finding: F039
Auto approve: 1