CVE-2014-9494

NameCVE-2014-9494
DescriptionRabbitMQ before 3.4.0 allows remote attackers to bypass the loopback_users restriction via a crafted X-Forwareded-For header.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs773134

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rabbitmq-server (PTS)jessie, jessie (lts)3.3.5-1.1+deb8u1fixed
stretch (security)3.6.6-1+deb9u2fixed
stretch (lts), stretch3.6.6+really3.8.9-0+deb9u2fixed
buster (security), buster, buster (lts)3.8.2-1+deb10u2fixed
bullseye (security), bullseye3.8.9-3+deb11u1fixed
bookworm (security), bookworm3.10.8-1.1+deb12u1fixed
sid, trixie3.10.8-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rabbitmq-serversourcesqueeze(not affected)
rabbitmq-serversourcewheezy(not affected)
rabbitmq-serversourcejessie3.3.5-1.1
rabbitmq-serversource(unstable)3.4.1-1773134

Notes

[wheezy] - rabbitmq-server <not-affected> (does not have this access control mechanism)
[squeeze] - rabbitmq-server <not-affected> (does not have this access control mechanism)
http://hg.rabbitmq.com/rabbitmq-management/rev/c3c41177a11a
http://hg.rabbitmq.com/rabbitmq-management/rev/35e916df027d
http://www.rabbitmq.com/release-notes/README-3.4.0.txt

Search for package or bug name: Reporting problems