Description
The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2013-0561.html
http://rhn.redhat.com/errata/RHSA-2013-0562.html
http://secunia.com/advisories/52516
https://bugzilla.redhat.com/show_bug.cgi?id=851355
https://issues.apache.org/jira/browse/QPID-4631
Related Vulnerabilities
CVE-2023-31206 Vulnerability in maven package org.apache.inlong:manager-web
CVE-2019-10404 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2016-3084 Vulnerability in maven package org.cloudfoundry.identity:cloudfoundry-identity-scim
CVE-2018-1000106 Vulnerability in maven package org.jenkins-ci.plugins:gerrit-trigger
CVE-2021-20334 Vulnerability in npm package mongodb-js-metrics