First published: Sun Nov 04 2012(Updated: )
The Amazon merchant SDK does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Merchant SDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5780 is considered a critical vulnerability due to its potential for man-in-the-middle attacks and SSL spoofing.
To mitigate CVE-2012-5780, ensure that your implementation of the Amazon merchant SDK validates the server hostname against the X.509 certificate's domain.
CVE-2012-5780 enables man-in-the-middle attacks by allowing attackers to spoof SSL servers with valid certificates.
The vulnerability affects all versions of the Amazon merchant SDK prior to any patches addressing the hostname validation issue.
Yes, CVE-2012-5780 directly relates to SSL security by allowing potential spoofing of SSL servers due to inadequate verification of certificates.