Описание
Apache Qpid Python client Improper certificate validation
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-1909
- https://github.com/apache/qpid-python/commit/7d8f51791c4949404d78f1083f465b7b4c8e954b
- https://github.com/pypa/advisory-database/tree/main/vulns/qpid-python/PYSEC-2013-25.yaml
- https://issues.apache.org/jira/browse/QPID-4918
- https://web.archive.org/web/20140722191407/http://secunia.com/advisories/53968
- https://web.archive.org/web/20140722194233/http://secunia.com/advisories/54137
- http://qpid.apache.org/releases/qpid-0.22/release-notes.html
- http://rhn.redhat.com/errata/RHSA-2013-1024.html
- http://svn.apache.org/viewvc?view=revision&revision=1460013
Пакеты
qpid-python
< 0.22
0.22
Связанные уязвимости
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The Python client in Apache Qpid before 2.2 does not verify that the s ...