Description
RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.
References
https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html
https://tanzu.vmware.com/security/cve-2021-22116
https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html
https://tanzu.vmware.com/security/cve-2021-22116
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-06-08T10:15:10.347Z
4 years agoLast modified
2024-11-21T04:49:32.330Z
1 year ago