Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2x83-r56g-cv47

Опубликовано: 17 окт. 2018
Источник: github
Github: Прошло ревью

Описание

Improper certificate validation in org.apache.httpcomponents:httpclient

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

Пакеты

Наименование

org.apache.httpcomponents:httpclient

maven
Затронутые версииВерсия исправления

< 4.2.3

4.2.3

EPSS

Процентиль: 79%
0.01248
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 11 лет назад

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

redhat
больше 11 лет назад

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

nvd
больше 11 лет назад

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

debian
больше 11 лет назад

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient befor ...

CVSS3: 5.3
fstec
около 13 лет назад

Уязвимость библиотеки клиентского модуля Apache HttpClient средства Apache HttpComponents, позволяющая нарушителю подменить SSL-серверы

EPSS

Процентиль: 79%
0.01248
Низкий

Дефекты

CWE-20