ID CVE-2014-3603
Summary The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:shibboleth:identity_provider:*:*:*:*:*:*:*:*
    cpe:2.3:a:shibboleth:identity_provider:*:*:*:*:*:*:*:*
  • cpe:2.3:a:shibboleth:opensaml_java:*:*:*:*:*:*:*:*
    cpe:2.3:a:shibboleth:opensaml_java:*:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 08-04-2019 - 13:22)
Impact:
Exploitability:
CWE CWE-297
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
confirm
secunia 60816
Last major update 08-04-2019 - 13:22
Published 04-04-2019 - 14:29
Last modified 08-04-2019 - 13:22
Back to Top