Vulnerability Name: | CVE-2020-15720 (CCN-185629) | ||||||||||||||||||
Assigned: | 2020-06-23 | ||||||||||||||||||
Published: | 2020-06-23 | ||||||||||||||||||
Updated: | 2020-07-23 | ||||||||||||||||||
Summary: | In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation. Since the verify parameter was hard-coded in all request functions, it was not possible to override the setting. As a result, tools making use of this class, such as the pki-server command, may have been vulnerable to Person-in-the-Middle attacks in certain non-localhost use cases. This is fixed in 10.9.0-b1. | ||||||||||||||||||
CVSS v3 Severity: | 6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N) 5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
4.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.9 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N)
| ||||||||||||||||||
Vulnerability Type: | CWE-295 | ||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-15720 Source: CCN Type: Red Hat Bugzilla - Bug 1855273 (CVE-2020-15720) - CVE-2020-15720 pki: dogtag's Python client does not validate certificate Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1855273 Source: XF Type: UNKNOWN dogtag-cve202015720-mitm(185629) Source: CCN Type: Dogtag PKI GIT Repository Dogtag PKI Source: MISC Type: Patch, Third Party Advisory https://github.com/dogtagpki/pki/commit/50c23ec146ee9abf28c9de87a5f7787d495f0b72 Source: MISC Type: Patch, Third Party Advisory https://github.com/dogtagpki/pki/compare/v10.9.0-a2...v10.9.0-b1 Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-15720 | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |