Description
PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-0095 | PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. |
Github GHSA |
GHSA-gh2c-6m38-c78j | PyWBEM TOCTOU vulnerability in certificate validation |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T17:39:01.254Z
Reserved: 2013-11-04T00:00:00.000Z
Link: CVE-2013-6444
No data.
Status : Modified
Published: 2014-05-05T17:06:04.763
Modified: 2026-05-06T22:30:45.220
Link: CVE-2013-6444
OpenCVE Enrichment
No data.
EUVD
Github GHSA