Miggo Logo

CVE-2017-15702: Apache Qpid Broker vulnerable to authentication port spoofing

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.86207%
CWE
-
Published
10/19/2018
Updated
11/4/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.qpid:qpid-brokermaven>= 0.18, <= 0.326.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability descriptions and references indicate a misconfiguration handling issue where authentication providers are not properly scoped to their respective ports, particularly affecting HTTP ports. However, none of the sources (CVE details, Jira ticket, or Apache advisory) explicitly identify specific functions or code paths responsible for this behavior. The lack of commit diffs, patch details, or concrete code examples makes it impossible to pinpoint exact vulnerable functions with high confidence. The vulnerability appears to stem from architectural/design flaws in port-specific authentication provider binding rather than isolated functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** Qpi* *rok*r-J v*rsions *.** t*rou** *.** *r* vuln*r**l* to *ut**nti**tion port spoo*in*. W**n t** *rok*r is *on*i*ur** wit* *i***r*nt *ut**nti**tion provi**rs on *i***r*nt ports, on* o* w*i** is *n *TTP port, t**n t** *rok*r **n ** tri*k** *y

Reasoning

T** provi*** vuln*r**ility **s*riptions *n* r***r*n**s in*i**t* * mis*on*i*ur*tion **n*lin* issu* w**r* *ut**nti**tion provi**rs *r* not prop*rly s*op** to t**ir r*sp**tiv* ports, p*rti*ul*rly *****tin* *TTP ports. *ow*v*r, non* o* t** sour**s (*V* *