Package: rabbitmq-server
Version: 3.2.0-1
Severity: critical

Hi,

I reported this to the maintainer, and to the security team a *very*
long time ago, though it seems to be that nothing has been done to
address this issue. As I have already discuss this publicly, and that
I am documenting it on the OpenStack doc, I think it is time to do
this public bug report.

By default, the RabbitMQ server package allows anyone to connect with
the login guest, and password guest. Over IPv4, that's not a problem,
since that's only possible through localhost. However, if a server is
using IPv6, the rabbitmq-server binds on it, and it is reachable from
the outside.

I can only guess what type of consequences this means. From a bad
security for those who uses the server in production, to a nasty DoS
of the system itself through resource starvations (message flooding).

I would strongly recommends that the rabbitqm-server package does the
at least one of following (by order of preference, and one option not
excluding another):

1/ Prompt for the default password change through debconf
2/ Do not bind on IPv6 by default (just only on ::1)
3/ Do not start if the default guest account has guest as password

Cheers,

Thomas Goirand (zigo)


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to