RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://tanzu.vmware.com/security/cve-2020-5419 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: pivotal
Published:
Updated: 2024-09-16T23:31:18.810Z
Reserved: 2020-01-03T00:00:00
Link: CVE-2020-5419

No data.

Status : Modified
Published: 2020-08-31T15:15:11.010
Modified: 2024-11-21T05:34:08.070
Link: CVE-2020-5419

No data.