mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@ubuntu.com",
|
|
"ID": "CVE-2014-9650",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CRLF injection vulnerability in the management plugin in RabbitMQ 2.1.0 through 3.4.x before 3.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the download parameter to api/definitions."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "RHSA-2016:0308",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0308.html"
|
|
},
|
|
{
|
|
"name": "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs"
|
|
},
|
|
{
|
|
"name": "http://www.rabbitmq.com/release-notes/README-3.4.1.txt",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.rabbitmq.com/release-notes/README-3.4.1.txt"
|
|
},
|
|
{
|
|
"name": "76091",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/76091"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20150121 CVE Request: XSS and response-splitting bugs in rabbitmq management plugin",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2015/01/21/13"
|
|
}
|
|
]
|
|
}
|
|
} |