PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Configurations
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2013/q4/524 - | |
References | () http://sourceforge.net/p/pywbem/code/627/ - Vendor Advisory | |
References | () http://sourceforge.net/p/pywbem/mailman/message/31757312/ - | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - | |
References | () http://www.securityfocus.com/bid/64544 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1044246 - |
Information
Published : 2014-05-05 17:06
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6444
Mitre link : CVE-2013-6444
CVE.ORG link : CVE-2013-6444
JSON object : View
Products Affected
pywbem_project
- pywbem
CWE
CWE-20
Improper Input Validation