CVE-2013-0308
git: Incorrect IMAP server's SSL x509.v3 certificate validation in git-imap-send command
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The imap-send command in GIT before 1.8.1.4 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
El comando imap-send en GIT antes de v1.8.1.4 no comprueba si el nombre del servidor coincide con un nombre de dominio en el nombre común del sujeto (CN) o el campo subjectAltName del certificado X.509, lo que permite atacantes MITM (Man-In-The-Middle) suplantar servidores SSL de su elección a través de un certificado válido.
Git is a fast, scalable, distributed revision control system. It was discovered that Git's git-imap-send command, a tool to send a collection of patches from standard input to an IMAP folder, did not properly perform SSL X.509 v3 certificate validation on the IMAP server's certificate, as it did not ensure that the server's hostname matched the one provided in the CN field of the server's certificate. A rogue server could use this flaw to conduct man-in-the-middle attacks, possibly leading to the disclosure of sensitive information.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-12-06 CVE Reserved
- 2013-03-05 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586 | X_refsource_misc | |
http://marc.info/?l=git&m=136134619013145&w=2 | Mailing List | |
http://support.apple.com/kb/HT5937 | X_refsource_confirm |
|
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | X_refsource_confirm |
|
http://www.securityfocus.com/bid/58148 | Vdb Entry | |
http://www.securitytracker.com/id/1028205 | Vdb Entry | |
https://bugzilla.novell.com/show_bug.cgi?id=804730 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/82329 | Vdb Entry | |
https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html | 2021-01-26 | |
http://lists.opensuse.org/opensuse-updates/2013-03/msg00005.html | 2021-01-26 | |
http://lists.opensuse.org/opensuse-updates/2013-03/msg00007.html | 2021-01-26 | |
http://rhn.redhat.com/errata/RHSA-2013-0589.html | 2021-01-26 | |
http://secunia.com/advisories/52361 | 2021-01-26 | |
http://secunia.com/advisories/52443 | 2021-01-26 | |
http://secunia.com/advisories/52467 | 2021-01-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=909977 | 2013-03-04 | |
https://access.redhat.com/security/cve/CVE-2013-0308 | 2013-03-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Git-scm Search vendor "Git-scm" | Git Search vendor "Git-scm" for product "Git" | <= 1.8.1.3 Search vendor "Git-scm" for product "Git" and version " <= 1.8.1.3" | - |
Affected
|