CVE-2012-4446

Severity
6.8MEDIUM
EPSS
0.4%
top 36.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 14
Latest updateMay 17

Description

The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages2 packages

NVDapache/qpid0.20+15

🔴Vulnerability Details

4
OSV
Improper Authentication in Apache Qpid2022-05-17
GHSA
Improper Authentication in Apache Qpid2022-05-17
OSV
CVE-2012-4446: The default configuration for Apache Qpid 02013-03-14
CVEList
CVE-2012-4446: The default configuration for Apache Qpid 02013-03-12

📋Vendor Advisories

1
Red Hat
qpid-cpp: qpid authentication bypass2013-03-06

💬Community

2
Bugzilla
CVE-2012-4446 CVE-2012-4458 CVE-2012-4459 qpid-cpp various flaws [fedora-all]2013-03-06
Bugzilla
CVE-2012-4446 qpid-cpp: qpid authentication bypass2012-08-23
CVE-2012-4446 (MEDIUM CVSS 6.8) | The default configuration for Apach | cvebase.io