https://bugzilla.redhat.com/show_bug.cgi?id=1185514


--- Doc Text *updated* by Martin Prpic <[email protected]> ---
A cross-site scripting vulnerability was discovered in RabbitMQ, which allowed 
using the 'api/' path info to inject and receive data. A remote attacker could 
use this flaw to create an 'api/' URL, forcing a server error that resulted in 
the server returning an HTML page with embedded text from the URL that was not 
escaped.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
erlang mailing list
[email protected]
http://lists.fedoraproject.org/admin/lists/[email protected]

Reply via email to