Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-4446

Опубликовано: 06 мар. 2013
Источник: redhat
CVSS2: 5.8
EPSS Низкий

Описание

The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.

It was found that the Apache Qpid daemon (qpidd) treated AMQP connections with the federation_tag attribute set as a broker-to-broker connection, rather than a client-to-server connection. This resulted in the source user ID of messages not being checked. A client that can establish an AMQP connection with the broker could use this flaw to bypass intended authentication. For Condor users, if condor-aviary is installed, this flaw could be used to submit jobs that would run as any user (except root, as Condor does not run jobs as root).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6qpid-cppAffected
MRG for RHEL-5 v. 2cumin-messagingFixedRHSA-2013:056106.03.2013
MRG for RHEL-5 v. 2mrg-releaseFixedRHSA-2013:056106.03.2013
MRG for RHEL-5 v. 2python-qpidFixedRHSA-2013:056106.03.2013
MRG for RHEL-5 v. 2qpid-cpp-mrgFixedRHSA-2013:056106.03.2013
MRG for RHEL-5 v. 2qpid-javaFixedRHSA-2013:056106.03.2013
MRG for RHEL-5 v. 2qpid-jcaFixedRHSA-2013:056106.03.2013
MRG for RHEL-5 v. 2qpid-qmfFixedRHSA-2013:056106.03.2013
MRG for RHEL-5 v. 2qpid-testsFixedRHSA-2013:056106.03.2013
MRG for RHEL-5 v. 2qpid-toolsFixedRHSA-2013:056106.03.2013

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=851355qpid-cpp: qpid authentication bypass

EPSS

Процентиль: 46%
0.00233
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.

nvd
почти 13 лет назад

The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.

debian
почти 13 лет назад

The default configuration for Apache Qpid 0.20 and earlier, when the f ...

github
больше 3 лет назад

Improper Authentication in Apache Qpid

EPSS

Процентиль: 46%
0.00233
Низкий

5.8 Medium

CVSS2