Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXI1M3Ytdm04Ny1mNzJj

Improper Validation of Certificates in apache axis

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Permalink: https://github.com/advisories/GHSA-r53v-vm87-f72c
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXI1M3Ytdm04Ny1mNzJj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 6 years ago
Updated: 9 months ago


Identifiers: GHSA-r53v-vm87-f72c, CVE-2014-3596
References: Blast Radius: 0.0

Affected Packages

maven:axis:axis
Dependent packages: 133
Dependent repositories: 1,117
Downloads:
Affected Version Ranges: <= 1.4
No known fixed version
All affected versions: 1.2.1
maven:org.apache.axis:axis
Dependent packages: 129
Dependent repositories: 2,473
Downloads:
Affected Version Ranges: <= 1.4
No known fixed version
All affected versions: