logo

CVE-2012-5817 org.codehaus.xfire:xfire-core

Package

Manager: maven
Name: org.codehaus.xfire:xfire-core
Vulnerable Version: >=0 <=1.2.6

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00132 pctl0.33555

Details

Improper Input Validation in XFire Codehaus XFire 1.2.6 and earlier, as used in the Amazon EC2 API Tools Java library and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Metadata

Created: 2022-05-17T01:38:40Z
Modified: 2024-02-14T21:29:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5jc8-8xhv-g8qm/GHSA-5jc8-8xhv-g8qm.json
CWE IDs: ["CWE-20", "CWE-295"]
Alternative ID: GHSA-5jc8-8xhv-g8qm
Finding: F184
Auto approve: 1