Description
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-0033 | The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. |
Github GHSA |
GHSA-3g2p-7c6p-vj8c | Apache Qpid Python client Improper certificate validation |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T17:42:38.074Z
Reserved: 2013-02-19T00:00:00.000Z
Link: CVE-2013-1909
No data.
Status : Modified
Published: 2013-08-23T16:55:07.063
Modified: 2026-04-29T01:13:23.040
Link: CVE-2013-1909
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA