脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
RabbitMQ exposes ports with weak default secrets in Zulip Server
脆弱性説明
Zulip is an open-source team collaboration tool. Zulip Server installs RabbitMQ for internal message passing. In versions of Zulip Server prior to 4.9, the initial installation (until first reboot, or restart of RabbitMQ) does not successfully limit the default ports which RabbitMQ opens; this includes port 25672, the RabbitMQ distribution port, which is used as a management port. RabbitMQ's default "cookie" which protects this port is generated using a weak PRNG, which limits the entropy of the password to at most 36 bits; in practicality, the seed for the randomizer is biased, resulting in approximately 20 bits of entropy. If other firewalls (at the OS or network level) do not protect port 25672, a remote attacker can brute-force the 20 bits of entropy in the "cookie" and leverage it for arbitrary execution of code as the rabbitmq user. They can also read all data which is sent through RabbitMQ, which includes all message traffic sent by users. Version 4.9 contains a patch for this vulnerability. As a workaround, ensure that firewalls prevent access to ports 5672 and 25672 from outside the Zulip server.
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
脆弱性タイプ
使用具有密码学弱点缺陷的PRNG
脆弱性タイトル
Zulip Server 安全特征问题漏洞
脆弱性説明
Zulip server是美国Zulip公司的一款开源的团队聊天应用程序。 Zulip Server 4.9之前版本存在安全特征问题漏洞,该漏洞源于不正确的输入验证造成的。远程攻击者可以发送精心编制的请求,并在目标系统上执行任意代码。
CVSS情報
N/A
脆弱性タイプ
N/A