3 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions. Se encontró una falla en AMQ-Streams de Red Hat, que incluye una versión del componente OKHttp con una falla de divulgación de información a través de una excepción activada por un encabezado que contiene un valor ilegal. Este problema podría permitir que un atacante autenticado acceda a información fuera de sus permisos habituales. • https://access.redhat.com/errata/RHSA-2023:1241 https://access.redhat.com/errata/RHSA-2023:3223 https://access.redhat.com/security/cve/CVE-2023-0833 https://bugzilla.redhat.com/show_bug.cgi?id=2169845 https://github.com/square/okhttp/issues/6738 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967 ** EN DISPUTA ** CertificatePinner.java en OkHttp desde la versión 3.x hasta la 3.12.0 permite un ataque man-in-the-middle para eludir la fijación de certificados cambiando SSLContext y los valores booleanos mientras enganchan la aplicación. NOTA: Esta identificación es cuestionada porque algunas partes no consideran que sea una vulnerabilidad. Su razón de ser se puede encontrar en https://github.com/square/okhttp/issues/4967. • https://cxsecurity.com/issue/WLB-2018120252 https://github.com/square/okhttp/commits/master https://github.com/square/okhttp/issues/4967 https://github.com/square/okhttp/releases https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E • CWE-295: Improper Certificate Validation •

CVSS: 5.9EPSS: 0%CPEs: 6EXPL: 0

OkHttp before 2.7.4 and 3.x before 3.1.2 allows man-in-the-middle attackers to bypass certificate pinning by sending a certificate chain with a certificate from a non-pinned trusted CA and the pinned certificate. OkHttp antes de 2.7.4 y 3.x antes de 3.1.2 permite que los atacantes man-in-the-middle eludan la fijación de certificados enviando una cadena de certificados con un CA no fijado confiable y el certificado fijado. • http://www.openwall.com/lists/oss-security/2016/02/10/8 http://www.openwall.com/lists/oss-security/2016/02/18/7 https://koz.io/pinning-cve-2016-2402 https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E https://publicobject.com/2016/02/11/okhttp-certificate-pinning-vulnerability • CWE-295: Improper Certificate Validation •