Apache Libcloud vulnerable to certificate impersonation
Moderate severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Sep 5, 2024
Description
Published by the National Vulnerability Database
Nov 4, 2012
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Jan 12, 2024
Last updated
Sep 5, 2024
Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
References