cvelist/2014/9xxx/CVE-2014-9649.json

82 lines
2.7 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 00:19:42 +00:00
"CVE_data_meta": {
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2014-9649",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 00:19:42 +00:00
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the path info to api/, which is not properly handled in an error message."
2017-10-16 12:31:07 -04:00
}
2019-03-18 00:19:42 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:0308",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0308.html"
},
{
"name": "76084",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76084"
},
{
"name": "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs"
},
{
"name": "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
"refsource": "CONFIRM",
"url": "http://www.rabbitmq.com/release-notes/README-3.4.1.txt"
},
{
"name": "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/21/13"
}
]
}
}