A flaw was found in qpid where it would accept any password or SASL mechanism, provided the remote user knew a valid cluster username. This would give a malicious remote attacker unauthorized access to the cluster where they would be able to receive replicated messages to the cluster, be able to send any cluster message, mark any present message as consumed, run any job on the cluster, and also view/modify/create other users' jobs. Only cluster messages and internal qpid/MRG configuration is accessible to the remote attacker.
For an attacker to successfully exploit this flaw, they would need to have physical access to the wired private interconnect LAN in which to plug in their own system. Typically, MRG interconnect is done by physical wiring to a secondary NIC on a cluster member, dedicated to the interconnect.
This issue has been addressed in following products: MRG for RHEL-5 v. 2 Via RHSA-2012:0529 https://rhn.redhat.com/errata/RHSA-2012-0529.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2012:0528 https://rhn.redhat.com/errata/RHSA-2012-0528.html
Created qpid-cpp tracking bugs for this issue Affects: fedora-all [bug 817644]
Statement: This flaw only affects the clustered implementation in qpid-cpp (qpidd-cpp-server-cluster) which is only available in Red Hat Enterprise MRG. The qpid-cpp-server as provided with Red Hat Enterprise Linux 6 does not include this functionality, and is thus not affected.