First published: Tue Oct 18 2011(Updated: )
A flaw was found in qpid where it would accept any password or SASL mechanism, provided the remote user knew a valid cluster username. This would give a malicious remote attacker unauthorized access to the cluster where they would be able to receive replicated messages to the cluster, be able to send any cluster message, mark any present message as consumed, run any job on the cluster, and also view/modify/create other users' jobs. Only cluster messages and internal qpid/MRG configuration is accessible to the remote attacker.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Qpid | =0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.