Vulnerability Name: | CVE-2012-6087 (CCN-81746) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2012-12-06 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2013-01-15 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2020-12-01 | ||||||||||||||||||||||||||||||||||||||||
Summary: | repository/s3/S3.php in the Amazon S3 library in Moodle through 2.2.11, 2.3.x before 2.3.9, 2.4.x before 2.4.6, and 2.5.x before 2.5.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to an incorrect CURLOPT_SSL_VERIFYHOST value. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:H/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-6087 Source: CONFIRM Type: Patch http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-40615 Source: MLIST Type: UNKNOWN [oss-security] 20130103 Re: CVE request: Curl insecure usage Source: CCN Type: BID-57103 Zabbix 'cURL' API Security Bypass Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 892700 CVE-2012-6087 moodle (Amazon S3 module): Improper use of cURL API might lead to improper SSL certificate verification (MiTM) Source: XF Type: UNKNOWN zabbix-curlapi-security-bypass(81746) Source: CONFIRM Type: Patch, Vendor Advisory https://moodle.org/mod/forum/discuss.php?d=238393 Source: CCN Type: Zabbix Web site Zabbix.org | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |