Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-5101

Опубликовано: 18 нояб. 2019
Источник: nvd
CVSS3: 4
CVSS3: 5.9
CVSS2: 4.3
EPSS Низкий

Описание

An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request.An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request. After an SSL connection is initialized via _ustream_ssl_init, and after any data (e.g. the client's HTTP reques

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:openwrt:openwrt:15.05.1:*:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:18.06.4:*:*:*:*:*:*:*

EPSS

Процентиль: 44%
0.00215
Низкий

4 Medium

CVSS3

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-295
CWE-295

Связанные уязвимости

CVSS3: 5.9
github
около 3 лет назад

An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request. After an SSL connection is initialized via _ustream_ssl_init, and after any data (e.g. the client's HTTP request) is written to the stream using ustream_printf, the code eventually enters the function __ustream_ssl_poll, which is used to dispatch the read/write events

CVSS3: 5.9
fstec
почти 6 лет назад

Уязвимость библиотеки Ustream-SSL встраиваемой операционной системы OpenWrt, позволяющая нарушителю реализовать атаку типа «человек посередине»

EPSS

Процентиль: 44%
0.00215
Низкий

4 Medium

CVSS3

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-295
CWE-295