4.3
CVSSv2

CVE-2012-6153

Published: 04/09/2014 Updated: 05/01/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient prior to 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

Vulnerable Product Search on Vulmon Subscribe to Product

apache commons-httpclient

Vendor Advisories

Synopsis Important: Red Hat JBoss Enterprise Application Platform 632 security update Type/Severity Security Advisory: Important Topic Updated Red Hat JBoss Enterprise Application Platform 632 packages thatfix three security issues are now available for Red Hat Enterprise Linux 5,6, and 7Red Hat Produc ...
Debian Bug report logs - #758086 CVE-2014-3577 Apache HttpComponents hostname verification bypass Package: commons-httpclient; Maintainer for commons-httpclient is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Henri Salo <henri@nervfi> Date: Thu, 14 Aug 2014 07:15:02 UTC Severi ...
Several security issues were fixed in commons-httpclient ...
Apache Commons HttpClient 3x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid ...