Описание
Apache Libcloud vulnerable to certificate impersonation
Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2012-3446
- https://github.com/apache/libcloud/commit/f2af5502dae3ac63e656dd1b7d5f29cc82ded401
- https://github.com/pypa/advisory-database/tree/main/vulns/apache-libcloud/PYSEC-2012-12.yaml
- https://svn.apache.org/repos/asf/libcloud/trunk/CHANGES
- http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
Пакеты
apache-libcloud
< 0.11.1
0.11.1
Связанные уязвимости
Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
Apache Libcloud before 0.11.1 uses an incorrect regular expression dur ...