CVE-2020-5419

Source
https://cve.org/CVERecord?id=CVE-2020-5419
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-5419.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-5419
Aliases
Published
2020-08-31T15:15:11.010Z
Modified
2026-02-11T14:26:44.721922Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.

References

Affected packages

Git / github.com/rabbitmq/rabbitmq-server

Affected ranges

Type
GIT
Repo
https://github.com/rabbitmq/rabbitmq-server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
Fixed

Affected versions

v3.*
v3.8.0
v3.8.1
v3.8.1-beta.1
v3.8.1-beta.2
v3.8.1-rc.1
v3.8.2
v3.8.2-rc.1
v3.8.3
v3.8.3-beta.1
v3.8.3-beta.2
v3.8.3-beta.3
v3.8.3-rc.1
v3.8.3-rc.2
v3.8.4
v3.8.4-beta.1
v3.8.4-rc.1
v3.8.4-rc.2
v3.8.4-rc.3
v3.8.5
v3.8.5-rc.1
v3.8.5-rc.2
v3.8.6
v3.8.6-beta.1
v3.8.6-rc.1
v3.8.6-rc.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-5419.json"