Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpxcXItYzJyMi05Y3Zy
Improper Certificate Validation in security-framework
If custom root certificates were registered with a ClientBuilder, the hostname of the target server would not be validated against its presented leaf certificate. This issue was fixed by properly configuring the trust evaluation logic to perform that check.
Permalink: https://github.com/advisories/GHSA-jqqr-c2r2-9cvrJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpxcXItYzJyMi05Y3Zy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: over 1 year ago
CVSS Score: 5.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Identifiers: GHSA-jqqr-c2r2-9cvr, CVE-2017-18588
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-18588
- https://github.com/sfackler/rust-security-framework/pull/27
- https://rustsec.org/advisories/RUSTSEC-2017-0003.html
- https://github.com/advisories/GHSA-jqqr-c2r2-9cvr
Blast Radius: 23.6
Affected Packages
cargo:security-framework
Dependent packages: 40Dependent repositories: 28,352
Downloads: 64,490,250 total
Affected Version Ranges: < 0.1.12
Fixed in: 0.1.12
All affected versions: 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.1.8, 0.1.9, 0.1.10, 0.1.11
All unaffected versions: 0.1.12, 0.1.13, 0.1.14, 0.1.15, 0.1.16, 0.2.0, 0.2.1, 0.2.2, 0.2.4, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 1.0.0, 2.0.0, 2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.6.0, 2.6.1, 2.7.0, 2.8.0, 2.8.1, 2.8.2, 2.9.0, 2.9.1, 2.9.2, 2.10.0, 2.11.0, 2.11.1, 3.0.0, 3.0.1