First published: Mon Nov 05 2012(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2012-5783">CVE-2012-5783</a> to the following vulnerability: Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via andaarbitrary valid certificate. References: [1] <a href="http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf">http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf</a> [2] <a href="https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-client-bugs.html">https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-client-bugs.html</a> [3] <a href="http://www.sigsac.org/ccs/CCS2012/techprogram.shtml">http://www.sigsac.org/ccs/CCS2012/techprogram.shtml</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Commons HttpClient | >=3.0 | |
Amazon Flexible Payments Service |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-873317 is considered moderate due to potential issues with SSL/TLS certificate validation.
To fix REDHAT-BUG-873317, update Apache Commons HttpClient to version 4.0 or later, which has addressed the vulnerability.
REDHAT-BUG-873317 affects Apache Commons HttpClient version 3.x and Amazon Flexible Payments Service (FPS) merchant Java SDK.
REDHAT-BUG-873317 is a vulnerability related to improper handling of SSL certificates in Apache Commons HttpClient.
A temporary workaround for REDHAT-BUG-873317 involves customizing the SSL configuration to enforce strict validation before making requests.