5 results (0.017 seconds)

CVSS: 5.3EPSS: 0%CPEs: 31EXPL: 0

Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution. Apache HttpClient versiones anteriores a 4.5.13 y 5.0.3, pueden interpretar inapropiadamente el componente authority malformado en las peticiones URI pasadas ??a la biblioteca como objeto java.net.URI y elegir el host de destino equivocado para una ejecución de la petición • https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749%40%3Cissues.maven.apache.org%3E https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9%40%3Cdev.hive.apache.org%3E https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb%40%3Cissues.drill.apache.org%3E https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1%40%3Cissues.solr.apache.org%3E https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe%40% • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 does not ensure that X509HostnameVerifier is not null, which allows attackers to have unspecified impact via vectors involving hostname verification. http/impl/client/HttpClientBuilder.java en Apache HttpClient en versiones 4.3.x anteriores a la 4.3.1 no garantiza que X509HostnameVerifier no sea null, lo que permite que atacantes provoquen un impacto sin especificar mediante vectores que implican la verificación de nombres de host. • http://svn.apache.org/r1528614 http://www.apache.org/dist/httpcomponents/httpclient/RELEASE_NOTES-4.3.x.txt • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 3%CPEs: 7EXPL: 0

http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors. http/conn/ssl/SSLConnectionSocketFactory.java en Apache HttpComponents HttpClient en versiones anteriores a 4.3.6 ignora el ajuste de configuración http.socket.timeout durante un handshake de SSL, lo que permite a atacantes remotos provocar una denegación de servicio (cuelgue de llamada HTTPS) a través de vectores no especificados. • http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html http://svn.apache.org/viewvc?view=revision&revision=1626784 http://www.oracle.com/technetwork/security-advisory/cpujul2018 • CWE-399: Resource Management Errors •

CVSS: 5.8EPSS: 0%CPEs: 2EXPL: 2

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field. org.apache.http.conn.ssl.AbstractVerifier en Apache HttpComponents HttpClient anterior a 4.3.5 y HttpAsyncClient anterior a 4.0.2 no verifica debidamente que el nombre del servidor coincide con un nombre de dominio en el campo del asunto Common Name (CN) o subjectAltName del certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a través de una cadena 'CN=' en un campo en el Distinguished Name (DN) de un certificado, tal y como fue demostrado por la cadena 'foo,CN=www.apache.org' en el campo O. It was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject's Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html http://rhn.redhat.com/errata/RHSA-2014-1146.html http://rhn.redhat.com/errata/RHSA-2014-1166.html http://rhn.redhat.com/errata/RHSA-2014-1833.html http://rhn.redhat.com/errata/RHSA-2014-1834.html http://rhn.redhat.com/errata/RHSA-2014-1835.html h • CWE-297: Improper Validation of Certificate with Host Mismatch •

CVSS: 4.3EPSS: 0%CPEs: 12EXPL: 0

Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used with an authenticating proxy server, sends the Proxy-Authorization header to the origin server, which allows remote web servers to obtain sensitive information by logging this header. Apache HttpClient v4.x antes de v4.1.1 en Apache HttpComponents, cuando se utiliza con un servidor proxy de autenticación, envía el encabezado Proxy-Authorization al servidor de origen, lo que permite obtener información sensible a los servidores Web remotos mediante la comprobación de esta cabecera. • http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061440.html http://marc.info/?l=httpclient-users&m=129853896315461&w=2 http://marc.info/?l=httpclient-users&m=129856318011586&w=2 http://marc.info/?l=httpclient-users&m=129857589129183&w=2 http://marc.info/?l=httpclient-users&m=129858274406594&w=2 http://marc.info/? • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •