The wsdl_first_https sample code in distribution/src/main/release/samples/wsdl_first_https/src/main/ in Apache CXF before 2.7.0 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. NOTE: The vendor states that the sample had specifically used a flag to bypass the DN check
History

Tue, 06 Aug 2024 22:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2012-11-04T22:00:00

Updated: 2024-08-06T21:14:16.436Z

Reserved: 2012-11-04T00:00:00

Link: CVE-2012-5786

cve-icon Vulnrichment

Updated: 2024-08-06T21:14:16.436Z

cve-icon NVD

Status : Modified

Published: 2012-11-04T22:55:03.450

Modified: 2024-08-06T22:15:36.527

Link: CVE-2012-5786

cve-icon Redhat

Severity : Moderate

Publid Date: 2012-10-16T00:00:00Z

Links: CVE-2012-5786 - Bugzilla