CVE-2025-50200

5.5 MEDIUM

📋 TL;DR

RabbitMQ versions 3.13.7 and prior log HTTP API authorization headers containing base64-encoded credentials in plaintext. This allows attackers with access to log files to decode and steal authentication credentials. Organizations using vulnerable RabbitMQ versions with HTTP API access are affected.

💻 Affected Systems

Products:
  • RabbitMQ
Versions: 3.13.7 and prior
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects HTTP API endpoints using basic authentication; AMQP and other protocols are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, gain full control of RabbitMQ, access sensitive messages, and potentially pivot to other systems.

🟠

Likely Case

Credential theft leading to unauthorized access to RabbitMQ management, message queues, and configuration data.

🟢

If Mitigated

Limited to log file access only; proper access controls prevent credential misuse.

🌐 Internet-Facing: HIGH - Internet-exposed instances allow attackers to trigger logging and potentially access logs.
🏢 Internal Only: MEDIUM - Requires internal network access or compromised accounts to access logs.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to log files; base64 decoding is trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.8

Vendor Advisory: https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Upgrade RabbitMQ to version 4.0.8 or later. 3. Restart RabbitMQ service. 4. Verify upgrade and functionality.

🔧 Temporary Workarounds

Disable HTTP API logging

all

Configure RabbitMQ to exclude authorization headers from logs

rabbitmqctl set_log_level error
Configure logback.xml to filter Authorization headers

Restrict log file access

linux

Set strict file permissions on RabbitMQ log directories

chmod 640 /var/log/rabbitmq/*
chown rabbitmq:rabbitmq /var/log/rabbitmq/*

🧯 If You Can't Patch

  • Implement strict access controls on RabbitMQ log directories and files
  • Monitor log files for unauthorized access attempts and credential extraction

🔍 How to Verify

Check if Vulnerable:

Check RabbitMQ version and examine log files for base64-encoded Authorization headers after HTTP API requests.

Check Version:

rabbitmqctl version

Verify Fix Applied:

After upgrade to 4.0.8+, verify version and test that Authorization headers no longer appear in logs.

📡 Detection & Monitoring

Log Indicators:

  • Base64 strings containing 'Authorization: Basic' in RabbitMQ logs
  • Unexpected access to log files

Network Indicators:

  • Unusual HTTP API authentication attempts from new sources

SIEM Query:

source="rabbitmq.log" AND "Authorization: Basic"

🔗 References

📤 Share & Export