Description
RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.
References
https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html
Mailing ListThird Party Advisory
https://tanzu.vmware.com/security/cve-2021-22116
Vendor Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-06-08T12:15:10.347
4 years agoLast modified
2022-10-25T16:33:02.987
2 years ago