Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2012-4446

The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 46.2%
CVSS Severity
CVSS v2 Score 6.8
Products affected by CVE-2012-4446
  • Apache » Qpid » Version: 0.10
    cpe:2.3:a:apache:qpid:0.10
  • Apache » Qpid » Version: 0.11
    cpe:2.3:a:apache:qpid:0.11
  • Apache » Qpid » Version: 0.12
    cpe:2.3:a:apache:qpid:0.12
  • Apache » Qpid » Version: 0.13
    cpe:2.3:a:apache:qpid:0.13
  • Apache » Qpid » Version: 0.14
    cpe:2.3:a:apache:qpid:0.14
  • Apache » Qpid » Version: 0.15
    cpe:2.3:a:apache:qpid:0.15
  • Apache » Qpid » Version: 0.16
    cpe:2.3:a:apache:qpid:0.16
  • Apache » Qpid » Version: 0.17
    cpe:2.3:a:apache:qpid:0.17
  • Apache » Qpid » Version: 0.18
    cpe:2.3:a:apache:qpid:0.18
  • Apache » Qpid » Version: 0.19
    cpe:2.3:a:apache:qpid:0.19
  • Apache » Qpid » Version: 0.20
    cpe:2.3:a:apache:qpid:0.20
  • Apache » Qpid » Version: 0.5
    cpe:2.3:a:apache:qpid:0.5
  • Apache » Qpid » Version: 0.6
    cpe:2.3:a:apache:qpid:0.6
  • Apache » Qpid » Version: 0.7
    cpe:2.3:a:apache:qpid:0.7
  • Apache » Qpid » Version: 0.8
    cpe:2.3:a:apache:qpid:0.8
  • Apache » Qpid » Version: 0.9
    cpe:2.3:a:apache:qpid:0.9


Contact Us

Shodan ® - All rights reserved