Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wx8f-7wmv-f3cq

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

WinSCP before 5.5.3, when FTP with TLS is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

WinSCP before 5.5.3, when FTP with TLS is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

EPSS

Процентиль: 36%
0.00152
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 12 лет назад

WinSCP before 5.5.3, when FTP with TLS is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

EPSS

Процентиль: 36%
0.00152
Низкий

Дефекты

CWE-20