CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
5Description
RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8.
Analysis
RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8.
Technical Context
Information disclosure occurs when an application inadvertently reveals sensitive data to unauthorized actors through error messages, logs, or improper access controls. This vulnerability is classified as Insertion of Sensitive Information into Log File (CWE-532).
Affected Products
Affected products: Broadcom Rabbitmq Server
Remediation
Implement proper access controls. Sanitize error messages in production. Review logging practices to avoid capturing sensitive data.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| oracular | ignored | end of life, was needs-triage |
| bionic | not-affected | - |
| focal | not-affected | - |
| jammy | not-affected | 3.9.27-0ubuntu0.2 |
| noble | not-affected | 3.12.1-1ubuntu1.2 |
| upstream | released | 4.0.5-9,4.0.8 |
| xenial | not-affected | - |
| plucky | released | 4.0.5-2ubuntu2.1 |
Debian
Bug #1108075| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye (security), bullseye | fixed | 3.8.9-3+deb11u1 | - |
| bookworm, bookworm (security) | fixed | 3.10.8-1.1+deb12u1 | - |
| trixie | fixed | 4.0.5-6+deb13u2 | - |
| forky, sid | fixed | 4.0.5-13 | - |
| bullseye | not-affected | - | - |
| bookworm | not-affected | - | - |
| (unstable) | fixed | 4.0.5-9 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18689