GHSA-55w9-c3g2-4rrh

Suggest an improvement
Source
https://github.com/advisories/GHSA-55w9-c3g2-4rrh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/10/GHSA-55w9-c3g2-4rrh/GHSA-55w9-c3g2-4rrh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-55w9-c3g2-4rrh
Aliases
Published
2020-10-07T17:51:02Z
Modified
2024-12-02T05:41:04.511974Z
Summary
Man-in-the-middle attack in Apache Axis
Details

Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-10-07T17:50:33Z"
}
References

Affected packages

Maven / org.apache.axis:axis

Package

Name
org.apache.axis:axis
View open source insights on deps.dev
Purl
pkg:maven/org.apache.axis/axis

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.4

Affected versions

1.*

1.4

Maven / axis:axis

Package

Name
axis:axis
View open source insights on deps.dev
Purl
pkg:maven/axis/axis

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.4

Affected versions

1.*

1.0
1.1-beta
1.1
1.2-alpha-1
1.2-beta-2
1.2-beta-3
1.2-RC1
1.2-RC2
1.2-RC3
1.2
1.2.1
1.3
1.4