Path to dependency file: /tensorflow/java/maven/tensorflow-hadoop/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.1.2/httpclient-4.1.2.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.1.2/httpclient-4.1.2.jar
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
CVE-2014-3577 - Medium Severity Vulnerability
Vulnerable Library - httpclient-4.1.2.jar
HttpComponents Client (base module)
Library home page: http://www.apache.org/
Path to dependency file: /tensorflow/java/maven/tensorflow-hadoop/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.1.2/httpclient-4.1.2.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.1.2/httpclient-4.1.2.jar
Dependency Hierarchy: - hadoop-common-2.6.0.jar (Root Library) - jets3t-0.9.0.jar - :x: **httpclient-4.1.2.jar** (Vulnerable Library)
Found in HEAD commit: 1f65fd168afc52c040a47230bb3cb902f7223124
Found in base branch: master
Vulnerability Details
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
Publish Date: 2014-08-21
URL: CVE-2014-3577
CVSS 3 Score Details (4.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2014-08-21
Fix Resolution (org.apache.httpcomponents:httpclient): 4.3.5
Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.6.1
Step up your Open Source Security Game with Mend here