383
VMScore

CVE-2014-3230

Published: 28/01/2020 Updated: 06/02/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The libwww-perl LWP::Protocol::https module 6.04 up to and including 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows malicious users to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

lwp\\ \\ protocol\\

Vendor Advisories

Debian Bug report logs - #746579 liblwp-protocol-https-perl: CVE-2014-3230: HTTPS_CA_DIR or HTTPS_CA_FILE disables peer certificate verification for IO::Socket::SSL Package: liblwp-protocol-https-perl; Maintainer for liblwp-protocol-https-perl is Debian Perl Group <pkg-perl-maintainers@listsaliothdebianorg>; Source for liblwp-pro ...
LWP::Protocol::https could be made to expose sensitive information over the network ...