Описание
ovirt-engine-sdk-python before 3.4.0.7 and 3.5.0.4 does not verify that the hostname of the remote endpoint matches the Common Name (CN) or subjectAltName as specified by its x.509 certificate in a TLS/SSL session. This could allow man-in-the-middle attackers to spoof remote endpoints via an arbitrary valid certificate.
Ссылки
- Broken Link
- Issue TrackingThird Party Advisory
- Broken Link
- Issue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.4.0.7 (исключая)Версия от 3.5.0.0 (включая) до 3.5.0.4 (исключая)
Одно из
cpe:2.3:a:ovirt-engine-sdk-python_project:ovirt-engine-sdk-python:*:*:*:*:*:*:*:*
cpe:2.3:a:ovirt-engine-sdk-python_project:ovirt-engine-sdk-python:*:*:*:*:*:*:*:*
EPSS
Процентиль: 29%
0.00104
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-295
Связанные уязвимости
CVSS3: 5.9
github
больше 3 лет назад
ovirt-engine-sdk-python improper validation of hostname in x.509 certificate
EPSS
Процентиль: 29%
0.00104
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-295