First published: Wed Sep 26 2018(Updated: )
An information-disclosure issue was discovered in Postman through 6.3.0. It validates a server's X.509 certificate and presents an error if the certificate is not valid. Unfortunately, the associated HTTPS request data is sent anyway. Only the response is not displayed. Thus, all contained information of the HTTPS request is disclosed to a man-in-the-middle attacker (for example, user credentials).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postman | <=6.3.0 | |
antsle Antman | <=6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-17215 is classified as moderate due to the potential information exposure.
To fix CVE-2018-17215, update Postman to a version later than 6.3.0 where this issue is resolved.
CVE-2018-17215 affects Postman versions up to and including 6.3.0.
CVE-2018-17215 is categorized as an information-disclosure vulnerability.
Yes, CVE-2018-17215 can potentially lead to data leaks by sending sensitive request data even when a certificate validation failure occurs.