https://bugzilla.redhat.com/show_bug.cgi?id=1185514

            Bug ID: 1185514
           Summary: RabbitMQ: /api/... XSS vulnerability
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: [email protected]
          Reporter: [email protected]
                CC: [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected], [email protected],
                    [email protected]



26437 prevent /api/* from returning text/html error messages which could act as
an XSS vector (since 2.1.0) 

Bug 26437 allowed an attacker to create a URL to "/api/..." which would 
provoke an internal server error, resulting in the server returning an 
html page with text from the URL embedded and not escaped. This was 
fixed by ensuring all URLs below /api/ only ever return responses with a 
content type of application/json, even in the case of an internal server 
error. 

Upstream patches:
http://hg.rabbitmq.com/rabbitmq-web-dispatch/rev/caf3d0a80cf3

References:
https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
erlang mailing list
[email protected]
https://lists.fedoraproject.org/mailman/listinfo/erlang

Reply via email to