Page 2 of 7 results (0.008 seconds)

CVSS: 5.8EPSS: 0%CPEs: 4EXPL: 0

Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. Apache Commons HttpClient v3.x, tal y como se utiliza en el Java SDK de Amazon Flexible Payments Service(FPS) y otros productos, no comprueba si el nombre del servidor coincide con un nombre de dominio en el nombre común (CN) del sujeto o con el campo subjectAltName del certificado X.509, lo que permite falsificar servidores SSL a atacantes man-in-the-middle mediante un certificado válido de su elección. It was found that Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. • http://lists.opensuse.org/opensuse-updates/2013-02/msg00078.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00040.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00041.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00053.html http://rhn.redhat.com/errata/RHSA-2013-0270.html http://rhn.redhat.com/errata/RHSA-2013-0679.html http://rhn.redhat.com/errata/RHSA-2013-0680.html http://rhn.redhat.com/errata/RHSA-2013-0681.html http://rhn.redhat. • CWE-295: Improper Certificate Validation •

CVSS: 4.3EPSS: 0%CPEs: 12EXPL: 0

Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used with an authenticating proxy server, sends the Proxy-Authorization header to the origin server, which allows remote web servers to obtain sensitive information by logging this header. Apache HttpClient v4.x antes de v4.1.1 en Apache HttpComponents, cuando se utiliza con un servidor proxy de autenticación, envía el encabezado Proxy-Authorization al servidor de origen, lo que permite obtener información sensible a los servidores Web remotos mediante la comprobación de esta cabecera. • http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061440.html http://marc.info/?l=httpclient-users&m=129853896315461&w=2 http://marc.info/?l=httpclient-users&m=129856318011586&w=2 http://marc.info/?l=httpclient-users&m=129857589129183&w=2 http://marc.info/?l=httpclient-users&m=129858274406594&w=2 http://marc.info/? • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •