The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated. NOTE: it could be argued that this is a design limitation of the Net::HTTPS API, and separate implementations should be independently assigned CVE identifiers for not working around this limitation. However, because this API was modified within LWP, a single CVE identifier has been assigned.
Advisories
Source ID Title
EUVD EUVD EUVD-2011-0651 The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated. NOTE: it could be argued that this is a design limitation of the Net::HTTPS API, and separate implementations should be independently assigned CVE identifiers for not working around this limitation. However, because this API was modified within LWP, a single CVE identifier has been assigned.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-16T17:53:46.874Z

Reserved: 2011-01-20T00:00:00Z

Link: CVE-2011-0633

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2011-05-13T22:55:01.610

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-0633

cve-icon Redhat

Severity : Moderate

Publid Date: 2011-03-08T00:00:00Z

Links: CVE-2011-0633 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses