First published: Thu Jan 19 2023(Updated: )
A security problem involving peer certificate verification was found where failed verification silently did nothing, making affected applications vulnerable to attackers. Attackers could lead a client application to believe that a secure connection to a rogue SSL server is legitimate. Attackers could also penetrate client-validated SSL server applications with a dummy certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/jruby-openssl | <0.6 | 0.6 |
JRuby | <0.6 | |
OpenSSL | <0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4123 is classified as a high-severity vulnerability due to the potential for attackers to impersonate legitimate SSL servers.
To fix CVE-2009-4123, upgrade the jruby-openssl library to version 0.6 or later.
CVE-2009-4123 affects applications utilizing the jruby-openssl library version 0.6 and below.
If exploited, CVE-2009-4123 allows attackers to successfully perform man-in-the-middle attacks by hijacking SSL connections.
Yes, CVE-2009-4123 remains a risk if vulnerable versions of jruby-openssl are still in use in applications.