Vulnerability CVE-2016-4432


Published: 2016-06-01

Description:
The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Apache Qpid Java Broker 6.0.2 Authentication Bypass
Alex Rudyy
31.05.2016

Type:

CWE-287

(Improper Authentication)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Apache -> Qpid java 

 References:
http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E
http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html
http://www.securityfocus.com/archive/1/538508/100/0/threaded
http://www.securitytracker.com/id/1035983
https://issues.apache.org/jira/browse/QPID-7257
https://svn.apache.org/viewvc?view=revision&revision=1743161
https://svn.apache.org/viewvc?view=revision&revision=1743393

Copyright 2024, cxsecurity.com

 

Back to Top