Description
The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
Published: 2013-03-12
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4620 The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
Github GHSA Github GHSA GHSA-mrgh-6x42-x6xf Improper Authentication in Apache Qpid
History

No history.

Subscriptions

Apache Qpid
Redhat Enterprise Mrg
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-09-16T18:34:59.045Z

Reserved: 2012-08-21T00:00:00.000Z

Link: CVE-2012-4446

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-03-14T03:10:22.530

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-4446

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-03-06T00:00:00Z

Links: CVE-2012-4446 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses