Описание
The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1:2.0.3-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [1:2.0.3-0ubuntu1]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | not-affected | code-not-present |
| raring | not-affected | code-not-present |
| saucy | ignored | end of life |
| trusty | not-affected | 1:2.0.3-0ubuntu1 |
| trusty/esm | DNE | trusty was not-affected [1:2.0.3-0ubuntu1] |
| upstream | needs-triage |
Показывать по
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
The OpenStack Python client library for Swift (python-swiftclient) 1.0 ...
Python Swift client is vulnerable to Missing SSL Certificate Check
EPSS
5.8 Medium
CVSS2