Описание
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The Python standard library HTTP client modules (such as httplib or urllib) did not perform verification of TLS/SSL certificates when connecting to HTTPS servers. A man-in-the-middle attacker could use this flaw to hijack connections and eavesdrop or modify transferred data.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | python | Will not fix | ||
Red Hat Enterprise Linux 6 | jython | Will not fix | ||
Red Hat Enterprise Linux 6 | python | Will not fix | ||
Red Hat JBoss Enterprise Application Platform 6 | jython-eap6 | Will not fix | ||
Red Hat JBoss SOA Platform 4.3 | jython | Will not fix | ||
Red Hat JBoss SOA Platform 5 | jython | Will not fix | ||
Red Hat OpenShift Enterprise 2 | jython | Will not fix | ||
Red Hat Software Collections | python33-python | Will not fix | ||
Red Hat Software Collections | rh-python34-python | Not affected | ||
Red Hat Enterprise Linux 7 | python | Fixed | RHSA-2017:1868 | 01.08.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.7 Medium
CVSS3
5.8 Medium
CVSS2
Связанные уязвимости
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) ...
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
ELSA-2017-1868: python security and bug fix update (MODERATE)
EPSS
4.7 Medium
CVSS3
5.8 Medium
CVSS2