org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
CVE-2014-3577 - Medium Severity Vulnerability
Vulnerable Library - httpclient-4.0.2.jar
HttpComponents Client (base module)
Library home page: http://hc.apache.org/httpcomponents-client
Path to vulnerable library: /root/.m2/repository/org/apache/httpcomponents/httpclient/4.0.2/httpclient-4.0.2.jar
Dependency Hierarchy: - maven-reporting-impl-2.3.jar (Root Library) - doxia-core-1.2.jar - xercesImpl-2.9.1.jar - :x: **httpclient-4.0.2.jar** (Vulnerable Library)
Found in HEAD commit: 1c0c1fb657845073b28de98c18338a5a470b0586
Vulnerability Details
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
Publish Date: 2014-08-21
URL: CVE-2014-3577
CVSS 2 Score Details (5.8)
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-3577
Release Date: 2014-08-21
Fix Resolution: 4.3.5,4.0.2