Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-44273

Опубликовано: 23 дек. 2021
Источник: ubuntu
Приоритет: medium
CVSS2: 5.8
CVSS3: 7.4

Описание

e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

focal

ignored

end of standard support, was needs-triage
hirsute

ignored

end of life
impish

ignored

end of life
jammy

needs-triage

Показывать по

5.8 Medium

CVSS2

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
около 4 лет назад

e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks.

CVSS3: 7.4
debian
около 4 лет назад

e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate va ...

CVSS3: 7.4
github
около 4 лет назад

e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks.

5.8 Medium

CVSS2

7.4 High

CVSS3