Staging Rabbitmq instance is exposed to the internet with default credentials
Low
U
Unikrn
Submitted None
Actions:
Reported by
albatraoz
Vulnerability Details
Technical details and impact analysis
**Description:**
RabbitMQ is an open-source message-broker software (sometimes called message-oriented middleware) that originally implemented the Advanced Message Queuing Protocol (AMQP) and has since been extended with a plug-in architecture to support Streaming Text Oriented Messaging Protocol (STOMP), Message Queuing Telemetry Transport (MQTT), and other protocols.
The instance of the rabbitmq of unikrn is exposed to the internet with the default credentials guest:guest which has an administrative access.
## Steps To Reproduce:
1. Visit ███████
2. Enter user as guest & password as guest.
3. Boom!! You are inside the management console of the rabbitmq of unikrn.
P.S I checked that the ssl certificates belong to domain *.dev.unikrn.space which proves that the instance belongs to unikrn and maybe used for production or development.
##Mitigation
Don't expose the rabbitmq console on the internet & remove the default credentials.
## Supporting Material/References:
Here is a screenshot of the list of queue
███
## Impact
The impact is critical as the attacker can get hell lot of details by dumping the queues as the queues are having confidential details like sso details & api details for different assets. Also the default credential has the administrative access which can help the attacker to add a new queue, modify or delete an existing queue etc.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Authentication - Generic