The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/05/02/8 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/05/04/1 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/05/06/8 | Mailing List Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746579 | Exploit Mailing List Patch Third Party Advisory |
https://github.com/libwww-perl/lwp-protocol-https/pull/14 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-01-28 16:15
Updated : 2024-02-04 20:39
NVD link : CVE-2014-3230
Mitre link : CVE-2014-3230
CVE.ORG link : CVE-2014-3230
JSON object : View
Products Affected
lwp\
- \
CWE
CWE-295
Improper Certificate Validation