GHSA-cmxj-wx9v-52qr

Suggest an improvement
Source
https://github.com/advisories/GHSA-cmxj-wx9v-52qr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-cmxj-wx9v-52qr/GHSA-cmxj-wx9v-52qr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cmxj-wx9v-52qr
Aliases
  • CVE-2014-3604
Published
2022-05-14T03:59:54Z
Modified
2024-12-05T05:56:56.068602Z
Summary
Improper Validation of Certificate with Host Mismatch in Not Yet Commons SSL
Details

Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Database specific
{
    "nvd_published_at": "2014-10-25T00:55:00Z",
    "cwe_ids": [
        "CWE-297"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-07-07T22:38:20Z"
}
References

Affected packages

Maven / ca.juliusdavies:not-yet-commons-ssl

Package

Name
ca.juliusdavies:not-yet-commons-ssl
View open source insights on deps.dev
Purl
pkg:maven/ca.juliusdavies/not-yet-commons-ssl

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.15

Affected versions

0.*

0.3.9
0.3.11