MyProxy 5.0 up to and including 5.2, as used in Globus Toolkit 5.0.0 up to and including 5.0.2, does not properly verify the (1) hostname or (2) identity in the X.509 certificate for the myproxy-server, which allows remote malicious users to spoof the server and conduct man-in-the-middle (MITM) attacks via a crafted certificate when executing (a) myproxy-logon or (b) myproxy-get-delegation.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ncsa myproxy 5.0 |
||
ncsa myproxy 5.1 |
||
ncsa myproxy 5.2 |
||
globus globus_toolkit 5.0.0 |
||
globus globus_toolkit 5.0.1 |
||
globus globus_toolkit 5.0.2 |