The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-5199 The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Github GHSA Github GHSA GHSA-rm7v-gqfg-p2wc Improper Validation of Certificate with Host Mismatch in Shibboleth Identity Provider and OpenSAML Java
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T10:50:17.020Z

Reserved: 2014-05-14T00:00:00

Link: CVE-2014-3603

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-04T14:29:00.240

Modified: 2024-11-21T02:08:29.300

Link: CVE-2014-3603

cve-icon Redhat

Severity : Important

Publid Date: 2014-08-13T00:00:00Z

Links: CVE-2014-3603 - Bugzilla

cve-icon OpenCVE Enrichment

No data.