CVE-2012-6153 – CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix
https://notcve.org/view.php?id=CVE-2012-6153
http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783. http/conn/ssl/AbstractVerifier.java en Apache Commons HttpClient anterior a 4.2.3 no verifica debidamente que el nombre del servidor coincide con un nombre de dominio en el campo del asunto Common Name (CN) o subjectAltName del certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a través de un certificado con un asunto que especifica un nombre común en un campo que no es el campo CN. NOTA: este problema existe debido a una solución incompleta para CVE-2012-5783. It was found that the fix for CVE-2012-5783 was incomplete: the code added to check that the server host name matches the domain name in a subject's Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. • http://rhn.redhat.com/errata/RHSA-2014-1098.html http://rhn.redhat.com/errata/RHSA-2014-1833.html http://rhn.redhat.com/errata/RHSA-2014-1834.html http://rhn.redhat.com/errata/RHSA-2014-1835.html http://rhn.redhat.com/errata/RHSA-2014-1836.html http://rhn.redhat.com/errata/RHSA-2014-1891.html http://rhn.redhat.com/errata/RHSA-2014-1892.html http://rhn.redhat.com/errata/RHSA-2015-0125.html http://rhn.redhat.com/errata/RHSA-2015-0158.html http://rhn • CWE-20: Improper Input Validation CWE-297: Improper Validation of Certificate with Host Mismatch •