The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
2013-08-23T16:55:07.063
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:N
8.6
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | redhat | enterprise_mrg | 2.0 | Yes |
Application | apache | qpid | ≤ 0.20 | Yes |
Application | apache | qpid | 0.5 | Yes |
Application | apache | qpid | 0.6 | Yes |
Application | apache | qpid | 0.7 | Yes |
Application | apache | qpid | 0.8 | Yes |
Application | apache | qpid | 0.9 | Yes |
Application | apache | qpid | 0.10 | Yes |
Application | apache | qpid | 0.11 | Yes |
Application | apache | qpid | 0.12 | Yes |
Application | apache | qpid | 0.13 | Yes |
Application | apache | qpid | 0.14 | Yes |
Application | apache | qpid | 0.15 | Yes |
Application | apache | qpid | 0.16 | Yes |
Application | apache | qpid | 0.17 | Yes |
Application | apache | qpid | 0.18 | Yes |
Application | apache | qpid | 0.19 | Yes |