Description
The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.
Remediation
References
https://svn.apache.org/viewvc?view=revision&revision=1743161
http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E
https://svn.apache.org/viewvc?view=revision&revision=1743393
https://issues.apache.org/jira/browse/QPID-7257
http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html
http://www.securitytracker.com/id/1035983
http://www.securityfocus.com/archive/1/538508/100/0/threaded
Related Vulnerabilities
CVE-2020-28267 Vulnerability in npm package @strikeentco/set
CVE-2023-3442 Vulnerability in maven package io.jenkins.plugins:servicenow-devops
CVE-2014-7810 Vulnerability in maven package org.apache.tomcat:tomcat-jasper
CVE-2023-30516 Vulnerability in maven package org.jenkins-ci.plugins:image-tag-parameter
CVE-2021-37695 Vulnerability in maven package org.webjars.bowergithub.ckeditor:ckeditor4