Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r53v-vm87-f72c

Опубликовано: 16 окт. 2018
Источник: github
Github: Прошло ревью

Описание

Improper Validation of Certificates in apache axis

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Ссылки

Пакеты

Наименование

org.apache.axis:axis

maven
Затронутые версииВерсия исправления

<= 1.4

Отсутствует

Наименование

axis:axis

maven
Затронутые версииВерсия исправления

<= 1.4

Отсутствует

EPSS

Процентиль: 78%
0.01225
Низкий

Дефекты

CWE-297

Связанные уязвимости

ubuntu
почти 11 лет назад

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

redhat
около 11 лет назад

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

nvd
почти 11 лет назад

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

debian
почти 11 лет назад

The getCN function in Apache Axis 1.4 and earlier does not properly ve ...

oracle-oval
почти 11 лет назад

ELSA-2014-1193: axis security update (IMPORTANT)

EPSS

Процентиль: 78%
0.01225
Низкий

Дефекты

CWE-297