CVE-2016-2166: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors.
References
- lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html
- packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html
- qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html
- www.securityfocus.com/archive/1/537864/100/0/threaded
- git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585
- github.com/advisories/GHSA-f5cf-f7px-xpmh
- issues.apache.org/jira/browse/PROTON-1157
- lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2016-2166
Detect and mitigate CVE-2016-2166 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →