Description
The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
Remediation
References
http://secunia.com/advisories/52516
http://rhn.redhat.com/errata/RHSA-2013-0561.html
http://rhn.redhat.com/errata/RHSA-2013-0562.html
https://bugzilla.redhat.com/show_bug.cgi?id=851355
https://issues.apache.org/jira/browse/QPID-4631
Related Vulnerabilities
CVE-2020-2160 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-36907 Vulnerability in maven package org.jenkins-ci.plugins:openshift-deployer
CVE-2023-31206 Vulnerability in maven package org.apache.inlong:manager-test
CVE-2020-17510 Vulnerability in maven package org.apache.shiro:shiro-spring-boot-web-starter
CVE-2018-17192 Vulnerability in maven package org.apache.nifi:nifi-jetty