Vulnerability Name: | CVE-2012-5822 (CCN-79929) | ||||||||
Assigned: | 2012-10-16 | ||||||||
Published: | 2012-10-16 | ||||||||
Updated: | 2017-08-29 | ||||||||
Summary: | The contribution feature in Zamboni does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the Python urllib2 library. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N) 4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:U/RC:UR)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Mozilla Web site Zamboni Source: MITRE Type: CNA CVE-2012-5822 Source: CCN Type: Vitaly Shmatikov's Research Paper (University of Texas) The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software Source: MISC Type: Exploit http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf Source: XF Type: UNKNOWN zamboni-ssl-spoofing(79929) Source: XF Type: UNKNOWN zamboni-ssl-spoofing(79929) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |