ChoeMinji / tensorflow-2.2.3

Apache License 2.0
0 stars 0 forks source link

CVE-2014-3577 (Medium) detected in httpclient-4.1.2.jar #35

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2014-3577 - Medium Severity Vulnerability

Vulnerable Library - httpclient-4.1.2.jar

HttpComponents Client (base module)

Library home page: http://www.apache.org/

Path to dependency file: /tensorflow/java/maven/tensorflow-hadoop/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.1.2/httpclient-4.1.2.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.1.2/httpclient-4.1.2.jar

Dependency Hierarchy: - hadoop-common-2.6.0.jar (Root Library) - jets3t-0.9.0.jar - :x: **httpclient-4.1.2.jar** (Vulnerable Library)

Found in HEAD commit: 1f65fd168afc52c040a47230bb3cb902f7223124

Found in base branch: master

Vulnerability Details

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

Publish Date: 2014-08-21

URL: CVE-2014-3577

CVSS 3 Score Details (4.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2014-08-21

Fix Resolution (org.apache.httpcomponents:httpclient): 4.3.5

Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.6.1


Step up your Open Source Security Game with Mend here