Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cfh5-3ghh-wfjx

Опубликовано: 17 окт. 2018
Источник: github
Github: Прошло ревью

Описание

Improper Verification of Cryptographic Signature in org.apache.httpcomponents:httpclient

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

Ссылки

Пакеты

Наименование

org.apache.httpcomponents:httpclient

maven
Затронутые версииВерсия исправления

< 4.3.5

4.3.5

EPSS

Процентиль: 79%
0.01367
Низкий

Дефекты

CWE-347

Связанные уязвимости

ubuntu
около 11 лет назад

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

CVSS3: 4.8
redhat
около 11 лет назад

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

nvd
около 11 лет назад

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

debian
около 11 лет назад

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents Htt ...

oracle-oval
почти 11 лет назад

ELSA-2014-1166: jakarta-commons-httpclient security update (IMPORTANT)

EPSS

Процентиль: 79%
0.01367
Низкий

Дефекты

CWE-347