https://bugzilla.redhat.com/show_bug.cgi?id=1185514
--- Doc Text *updated* by Martin Prpic <[email protected]> --- A cross-site scripting vulnerability was discovered in RabbitMQ, which allowed using the 'api/' path info to inject and receive data. A remote attacker could use this flaw to create an 'api/' URL, forcing a server error that resulted in the server returning an HTML page with embedded text from the URL that was not escaped. -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ erlang mailing list [email protected] http://lists.fedoraproject.org/admin/lists/[email protected]
