Description
The contribution feature in Zamboni does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the Python urllib2 library.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T21:21:26.923Z
Reserved: 2012-11-04T00:00:00.000Z
Link: CVE-2012-5822
No data.
Status : Deferred
Published: 2012-11-04T22:55:04.857
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-5822
No data.
OpenCVE Enrichment
No data.
Weaknesses