Описание
google-checkout-php-sample-code before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Уязвимые конфигурации
Конфигурация 1Версия до 1.3.1 (включая)
Одно из
cpe:2.3:a:google:checkout-php:*:*:*:*:*:*:*:*
cpe:2.3:a:google:checkout-php:1.2:*:*:*:*:*:*:*
cpe:2.3:a:google:checkout-php:1.2:beta:*:*:*:*:*:*
cpe:2.3:a:google:checkout-php:1.2.1:beta:*:*:*:*:*:*
cpe:2.3:a:google:checkout-php:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:google:checkout-php:1.2.5a:*:*:*:*:*:*:*
cpe:2.3:a:google:checkout-php:1.3.0:*:*:*:*:*:*:*
EPSS
Процентиль: 16%
0.00051
Низкий
5.8 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
google-checkout-php-sample-code before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
EPSS
Процентиль: 16%
0.00051
Низкий
5.8 Medium
CVSS2
Дефекты
CWE-20