Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
02 Apr 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Broadcom rabbitmq Server
Broadcom |
|
CPE | cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:* | |
References | () https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0078 - Third Party Advisory | |
References | () https://pivotal.io/security/cve-2019-11287 - Vendor Advisory |
07 Nov 2023, 03:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-11-23 00:15
Updated : 2025-04-02 14:13
NVD link : CVE-2019-11287
Mitre link : CVE-2019-11287
JSON object : View
Products Affected
debian
- debian_linux
redhat
- openstack
broadcom
- rabbitmq_server
fedoraproject
- fedora
pivotal_software
- rabbitmq
CWE
CWE-134
Use of Externally-Controlled Format String