CVE-2013-4314 – pyopenssl
Package
Manager: pip
Name: pyopenssl
Vulnerable Version: >=0 <0.13.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0025 pctl0.48068
Details
PyOpenSSL Mishandles NUL Byte In Certificate Subject Alternative Name The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a `\0` character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Metadata
Created: 2022-05-17T04:56:46Z
Modified: 2024-10-24T21:47:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6748-36qp-fx6r/GHSA-6748-36qp-fx6r.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-6748-36qp-fx6r
Finding: F184
Auto approve: 1