The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.
References
Link | Resource |
---|---|
https://svn.apache.org/viewvc?view=revision&revision=1743161 | Patch Vendor Advisory |
http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E | Vendor Advisory |
https://svn.apache.org/viewvc?view=revision&revision=1743393 | Patch Vendor Advisory |
https://issues.apache.org/jira/browse/QPID-7257 | Issue Tracking Vendor Advisory |
http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1035983 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/538508/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2016-06-01 13:59
Updated : 2022-12-07 08:39
NVD link : CVE-2016-4432
Mitre link : CVE-2016-4432
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
apache
- qpid_broker-j