First published: Wed Aug 20 2014(Updated: )
It was discovered that HttpResource and FileBackedHttpResource implementations in OpenSAML Java and Shibboleth IdP did not enable hostname verification when using TLS connections. Additionaly, OpenSAML Java makes use of Jakarta Commons HttpClient version 3.x, which does not perform verification of the server hostname against the server's X.508 certificate (<a href="https://access.redhat.com/security/cve/CVE-2012-5783">CVE-2012-5783</a>). This flaw can be exploited by a Man-in-the-middle (MITM) attack, where the attacker can spoof a valid certificate using a specially crafted subject.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/opensaml | <2.6.2 | 2.6.2 |
Shibboleth Identity Provider | <2.4.1 | |
Shibboleth Opensaml Java | <2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.