Withdrawn Advisory: Improper Certificate Validation in Apache Qpid Proton
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jul 1, 2025
Withdrawn
This advisory was withdrawn on Jul 1, 2025
Description
Published by the National Vulnerability Database
Apr 23, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Nov 2, 2022
Last updated
Jul 1, 2025
Withdrawn
Jul 1, 2025
Withdrawn Advisory
This advisory has been withdrawn because the vulnerability only affects the Qpid Proton C library and not
org.apache.qpid:proton-j. This link has been maintained to preserve external references.Original Description
While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS even when configured to verify the peer certificate while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.
References