CVE-2020-13956 – apache-httpclient: incorrect handling of malformed authority component in request URIs
https://notcve.org/view.php?id=CVE-2020-13956
Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution. Apache HttpClient versiones anteriores a 4.5.13 y 5.0.3, pueden interpretar inapropiadamente el componente authority malformado en las peticiones URI pasadas ??a la biblioteca como objeto java.net.URI y elegir el host de destino equivocado para una ejecución de la petición • https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749%40%3Cissues.maven.apache.org%3E https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9%40%3Cdev.hive.apache.org%3E https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb%40%3Cissues.drill.apache.org%3E https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1%40%3Cissues.solr.apache.org%3E https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe%40% • CWE-20: Improper Input Validation •
CVE-2020-15094 – RCE in Symfony
https://notcve.org/view.php?id=CVE-2020-15094
In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5. • https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78 https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC https://packagist.org/packages/symfony/http-kernel https://packagist.org/packages/symfony/symfony • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •
CVE-2013-4366
https://notcve.org/view.php?id=CVE-2013-4366
http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 does not ensure that X509HostnameVerifier is not null, which allows attackers to have unspecified impact via vectors involving hostname verification. http/impl/client/HttpClientBuilder.java en Apache HttpClient en versiones 4.3.x anteriores a la 4.3.1 no garantiza que X509HostnameVerifier no sea null, lo que permite que atacantes provoquen un impacto sin especificar mediante vectores que implican la verificación de nombres de host. • http://svn.apache.org/r1528614 http://www.apache.org/dist/httpcomponents/httpclient/RELEASE_NOTES-4.3.x.txt • CWE-20: Improper Input Validation •
CVE-2015-5262
https://notcve.org/view.php?id=CVE-2015-5262
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors. http/conn/ssl/SSLConnectionSocketFactory.java en Apache HttpComponents HttpClient en versiones anteriores a 4.3.6 ignora el ajuste de configuración http.socket.timeout durante un handshake de SSL, lo que permite a atacantes remotos provocar una denegación de servicio (cuelgue de llamada HTTPS) a través de vectores no especificados. • http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html http://svn.apache.org/viewvc?view=revision&revision=1626784 http://www.oracle.com/technetwork/security-advisory/cpujul2018 • CWE-399: Resource Management Errors •
CVE-2014-3577 – CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
https://notcve.org/view.php?id=CVE-2014-3577
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field. org.apache.http.conn.ssl.AbstractVerifier en Apache HttpComponents HttpClient anterior a 4.3.5 y HttpAsyncClient anterior a 4.0.2 no verifica debidamente que el nombre del servidor coincide con un nombre de dominio en el campo del asunto Common Name (CN) o subjectAltName del certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a través de una cadena 'CN=' en un campo en el Distinguished Name (DN) de un certificado, tal y como fue demostrado por la cadena 'foo,CN=www.apache.org' en el campo O. It was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject's Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html http://rhn.redhat.com/errata/RHSA-2014-1146.html http://rhn.redhat.com/errata/RHSA-2014-1166.html http://rhn.redhat.com/errata/RHSA-2014-1833.html http://rhn.redhat.com/errata/RHSA-2014-1834.html http://rhn.redhat.com/errata/RHSA-2014-1835.html h • CWE-297: Improper Validation of Certificate with Host Mismatch •