Severity
5.8MEDIUM
EPSS
1.4%
top 19.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 21
Latest updateOct 6
Description
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
CVSS vector
AV:N/AC:M/C:P/I:P/A:NExploitability: 8.6 | Impact: 4.9
Affected Packages5 packages
🔴Vulnerability Details
4📋Vendor Advisories
4Debian▶
CVE-2014-3577: commons-httpclient - org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient be...↗2014
💬Community
3Bugzilla▶
CVE-2014-3577 jakarta-commons-httpclient: SSL hostname verification bypass, incomplete CVE-2012-6153 fix [fedora-all]↗2014-08-18
Bugzilla▶
CVE-2014-3577 httpcomponents-client: Apache HttpComponents client: Hostname verification susceptible to MITM attack [fedora-all]↗2014-08-18
Bugzilla▶
CVE-2014-3577 Apache HttpComponents client / Apache CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix↗2014-08-12