Vulnerabilities > CVE-2012-5783 - Improper Certificate Validation vulnerability in multiple products

047910
CVSS 5.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE

Summary

Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Creating a Rogue Certificate Authority Certificate
    An attacker exploits a weakness in the MD5 hash algorithm (weak collision resistance) to generate a certificate signing request (CSR) that contains collision blocks in the "to be signed" part. The attacker specially crafts two different, but valid X.509 certificates that when hashed with the MD5 algorithm would yield the same value. The attacker then sends the CSR for one of the certificates to the Certification Authority which uses the MD5 hashing algorithm. That request is completely valid and the Certificate Authority issues an X.509 certificate to the attacker which is signed with its private key. An attacker then takes that signed blob and inserts it into another X.509 certificate that the attacker generated. Due to the MD5 collision, both certificates, though different, hash to the same value and so the signed blob works just as well in the second certificate. The net effect is that the attackers' second X.509 certificate, which the Certification Authority has never seen, is now signed and validated by that Certification Authority. To make the attack more interesting, the second certificate could be not just a regular certificate, but rather itself a signing certificate. Thus the attacker is able to start their own Certification Authority that is anchored in its root of trust in the legitimate Certification Authority that has signed the attackers' first X.509 certificate. If the original Certificate Authority was accepted by default by browsers, so will now the Certificate Authority set up by the attacker and of course any certificates that it signs. So the attacker is now able to generate any SSL certificates to impersonate any web server, and the user's browser will not issue any warning to the victim. This can be used to compromise HTTPS communications and other types of systems where PKI and X.509 certificates may be used (e.g., VPN, IPSec) .

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0680.NASL
    descriptionAn updated jakarta-commons-httpclient package for JBoss Enterprise Application Platform 5.2.0 which fixes one security issue is now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Jakarta Commons HttpClient component can be used to build HTTP-aware client applications (such as web browsers and web service clients). The Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject
    last seen2020-06-01
    modified2020-06-02
    plugin id65677
    published2013-03-26
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/65677
    titleRHEL 5 / 6 : jakarta-commons-httpclient (RHSA-2013:0680)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2013:0680. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(65677);
      script_version("1.16");
      script_cvs_date("Date: 2019/10/24 15:35:36");
    
      script_cve_id("CVE-2012-5783");
      script_bugtraq_id(58073);
      script_xref(name:"RHSA", value:"2013:0680");
    
      script_name(english:"RHEL 5 / 6 : jakarta-commons-httpclient (RHSA-2013:0680)");
      script_summary(english:"Checks the rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated jakarta-commons-httpclient package for JBoss Enterprise
    Application Platform 5.2.0 which fixes one security issue is now
    available for Red Hat Enterprise Linux 4, 5, and 6.
    
    The Red Hat Security Response Team has rated this update as having
    moderate security impact. A Common Vulnerability Scoring System (CVSS)
    base score, which gives a detailed severity rating, is available from
    the CVE link in the References section.
    
    The Jakarta Commons HttpClient component can be used to build
    HTTP-aware client applications (such as web browsers and web service
    clients).
    
    The Jakarta Commons HttpClient component did not verify that the
    server hostname matched the domain name in the subject's Common Name
    (CN) or subjectAltName field in X.509 certificates. This could allow a
    man-in-the-middle attacker to spoof an SSL server if they had a
    certificate that was valid for any domain name. (CVE-2012-5783)
    
    Warning: Before applying this update, back up your existing JBoss
    Enterprise Application Platform installation (including all
    applications and configuration files).
    
    All users of JBoss Enterprise Application Platform 5.2.0 on Red Hat
    Enterprise Linux 4, 5, and 6 are advised to upgrade to this updated
    package. The JBoss server process must be restarted for the update to
    take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2013:0680"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-5783"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected jakarta-commons-httpclient package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:ND");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jakarta-commons-httpclient");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/11/04");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/03/25");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/03/26");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2013:0680";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_exists(rpm:"jakarta-commons-httpclient-3.1-2", release:"RHEL5") && rpm_check(release:"RHEL5", reference:"jakarta-commons-httpclient-3.1-2.1_patch_01.ep5.el5")) flag++;
    
      if (rpm_exists(rpm:"jakarta-commons-httpclient-3.1-2", release:"RHEL6") && rpm_check(release:"RHEL6", reference:"jakarta-commons-httpclient-3.1-2_patch_01.ep5.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "jakarta-commons-httpclient");
      }
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-304.NASL
    descriptionjakarta-commons-httpclient was updated to enhance the fix of bnc#803332 / CVE-2012-5783 - also check for subjectAltNames in the certificate.
    last seen2020-06-05
    modified2014-06-13
    plugin id74960
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74960
    titleopenSUSE Security Update : jakarta-commons-httpclient (openSUSE-SU-2013:0622-1)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2013-169.NASL
    descriptionThe Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject
    last seen2020-06-01
    modified2020-06-02
    plugin id69728
    published2013-09-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69728
    titleAmazon Linux AMI : jakarta-commons-httpclient (ALAS-2013-169)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_JAKARTA-COMMONS-HTTPCLIENT3-130328.NASL
    descriptionThe following issue has been fixed : - SSL certificate hostname verification was not done and is fixed by this update. (CVE-2012-5783)
    last seen2020-06-05
    modified2013-04-04
    plugin id65795
    published2013-04-04
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/65795
    titleSuSE 11.2 Security Update : jakarta (SAT Patch Number 7574)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2769-1.NASL
    descriptionIt was discovered that Apache Commons HttpClient did not properly verify the Common Name or subjectAltName fields of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-5783) Florian Weimer discovered the fix for CVE-2012-5783 was incomplete for Apache Commons HttpClient. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-6153) Subodh Iyengar and Will Shackleton discovered the fix for CVE-2012-5783 was incomplete for Apache Commons HttpClient. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. (CVE-2014-3577) It was discovered that Apache Commons HttpClient did not properly handle read timeouts during HTTPS handshakes. A remote attacker could trigger this flaw to cause a denial of service. (CVE-2015-5262). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id86401
    published2015-10-15
    reporterUbuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86401
    titleUbuntu 12.04 LTS / 14.04 LTS / 15.04 : commons-httpclient vulnerabilities (USN-2769-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-222.NASL
    descriptionCVE-2012-5783 and CVE-2012-6153 Apache Commons HttpClient 3.1 did not verify that the server hostname matches a domain name in the subject
    last seen2020-03-17
    modified2015-05-20
    plugin id83545
    published2015-05-20
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83545
    titleDebian DLA-222-1 : commons-httpclient security update
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1320.NASL
    descriptionUpdated packages for Red Hat JBoss Enterprise Web Platform 5.2.0 that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Web Platform is a platform for Java applications, which integrates the JBoss Web Server with JBoss Hibernate and JBoss Seam. It was found that the fix for CVE-2012-5783 was incomplete: the code added to check that the server host name matches the domain name in a subject
    last seen2020-06-01
    modified2020-06-02
    plugin id78007
    published2014-10-01
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78007
    titleRHEL 4 / 5 / 6 : JBoss EWP (RHSA-2014:1320)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130219_JAKARTA_COMMONS_HTTPCLIENT_ON_SL5_X.NASL
    descriptionThe Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject
    last seen2020-03-18
    modified2013-02-21
    plugin id64778
    published2013-02-21
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64778
    titleScientific Linux Security Update : jakarta-commons-httpclient on SL5.x, SL6.x i386/x86_64 (20130219)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-1289.NASL
    descriptionThis update fixes a security vulnerability that caused jakarta-commons-httpclient not to verify that the server hostname matches a domain name in the subject
    last seen2020-03-17
    modified2013-02-04
    plugin id64409
    published2013-02-04
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64409
    titleFedora 16 : jakarta-commons-httpclient-3.1-12.fc16 (2013-1289)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1321.NASL
    descriptionUpdated packages for Red Hat JBoss Enterprise Application Platform 5.2.0 that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. It was found that the fix for CVE-2012-5783 was incomplete: the code added to check that the server host name matches the domain name in a subject
    last seen2020-06-01
    modified2020-06-02
    plugin id78008
    published2014-10-01
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78008
    titleRHEL 4 / 5 / 6 : JBoss EAP (RHSA-2014:1321)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-0224.NASL
    descriptionAn updated redhat-support-plugin-rhev package that fixes one security issue is now available. The Red Hat Security Response Team has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Red Hat Support plug-in for Red Hat Enterprise Virtualization is a new feature which offers seamless integrated access to Red Hat Access services from the Red Hat Enterprise Virtualization Administration Portal. The plug-in provides automated functionality that enables quicker help, answers, and proactive services. It offers easy and instant access to Red Hat exclusive knowledge, resources, engagement, and diagnostic features. Detailed information about this plug-in can be found in the Red Hat Customer Portal at https://access.redhat.com/site/articles/425603 The Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject
    last seen2020-06-01
    modified2020-06-02
    plugin id78999
    published2014-11-08
    reporterThis script is Copyright (C) 2014-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78999
    titleRHEL 6 : redhat-support-plugin-rhev (RHSA-2014:0224)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2014-410.NASL
    descriptionApache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject
    last seen2020-06-01
    modified2020-06-02
    plugin id78353
    published2014-10-12
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78353
    titleAmazon Linux AMI : jakarta-commons-httpclient (ALAS-2014-410)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-9581.NASL
    descriptionSecurity fix for CVE-2014-3577, CVE-2012-6153 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-08-27
    plugin id77399
    published2014-08-27
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77399
    titleFedora 20 : jakarta-commons-httpclient-3.1-15.fc20 (2014-9581)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2013-0270.NASL
    descriptionUpdated jakarta-commons-httpclient packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Jakarta Commons HttpClient component can be used to build HTTP-aware client applications (such as web browsers and web service clients). The Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject
    last seen2020-06-01
    modified2020-06-02
    plugin id64691
    published2013-02-20
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64691
    titleCentOS 5 : jakarta-commons-httpclient (CESA-2013:0270)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-161.NASL
    descriptionjakarta-commons-httpclient3 was updated to add SSL certificate hostname checking. (CVE-2012-5783)
    last seen2020-06-05
    modified2014-06-13
    plugin id74904
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74904
    titleopenSUSE Security Update : jakarta-commons-httpclient3 (openSUSE-SU-2013:0354-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-1203.NASL
    descriptionThis update fixes a security vulnerability that caused jakarta-commons-httpclient not to verify that the server hostname matches a domain name in the subject
    last seen2020-03-17
    modified2013-02-04
    plugin id64404
    published2013-02-04
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64404
    titleFedora 18 : jakarta-commons-httpclient-3.1-12.fc18 (2013-1203)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-1189.NASL
    descriptionThis update fixes a security vulnerability that caused jakarta-commons-httpclient not to verify that the server hostname matches a domain name in the subject
    last seen2020-03-17
    modified2013-02-04
    plugin id64402
    published2013-02-04
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64402
    titleFedora 17 : jakarta-commons-httpclient-3.1-12.fc17 (2013-1189)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1162.NASL
    descriptionUpdated Red Hat JBoss Enterprise Application Platform 6.3.0 packages that fix two security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the fix for CVE-2012-5783 was incomplete: the code added to check that the server host name matches the domain name in a subject
    last seen2020-06-01
    modified2020-06-02
    plugin id77561
    published2014-09-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77561
    titleRHEL 5 / 6 / 7 : JBoss EAP (RHSA-2014:1162)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0270.NASL
    descriptionUpdated jakarta-commons-httpclient packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Jakarta Commons HttpClient component can be used to build HTTP-aware client applications (such as web browsers and web service clients). The Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject
    last seen2020-06-01
    modified2020-06-02
    plugin id64695
    published2013-02-20
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64695
    titleRHEL 5 / 6 : jakarta-commons-httpclient (RHSA-2013:0270)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2013-0270.NASL
    descriptionFrom Red Hat Security Advisory 2013:0270 : Updated jakarta-commons-httpclient packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Jakarta Commons HttpClient component can be used to build HTTP-aware client applications (such as web browsers and web service clients). The Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject
    last seen2020-06-01
    modified2020-06-02
    plugin id68731
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68731
    titleOracle Linux 5 / 6 : jakarta-commons-httpclient (ELSA-2013-0270)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-9539.NASL
    descriptionSecurity fix for CVE-2014-3577, CVE-2012-6153 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-08-27
    plugin id77396
    published2014-08-27
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77396
    titleFedora 19 : jakarta-commons-httpclient-3.1-15.fc19 (2014-9539)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-305.NASL
    descriptionjakarta-commons-httpclient3 was updated to enhance the fix of bnc#803332 / CVE-2012-5783 : - also add a check for subjectAltNames in certificates
    last seen2020-06-05
    modified2014-06-13
    plugin id74961
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74961
    titleopenSUSE Security Update : jakarta-commons-httpclient3 (openSUSE-SU-2013:0623-1)

Redhat

advisories
  • bugzilla
    id873317
    titleCVE-2012-5783 jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentjakarta-commons-httpclient is earlier than 1:3.0-7jpp.2
            ovaloval:com.redhat.rhsa:tst:20130270001
          • commentjakarta-commons-httpclient is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130270002
        • AND
          • commentjakarta-commons-httpclient-manual is earlier than 1:3.0-7jpp.2
            ovaloval:com.redhat.rhsa:tst:20130270003
          • commentjakarta-commons-httpclient-manual is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130270004
        • AND
          • commentjakarta-commons-httpclient-demo is earlier than 1:3.0-7jpp.2
            ovaloval:com.redhat.rhsa:tst:20130270005
          • commentjakarta-commons-httpclient-demo is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130270006
        • AND
          • commentjakarta-commons-httpclient-javadoc is earlier than 1:3.0-7jpp.2
            ovaloval:com.redhat.rhsa:tst:20130270007
          • commentjakarta-commons-httpclient-javadoc is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130270008
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentjakarta-commons-httpclient-demo is earlier than 1:3.1-0.7.el6_3
            ovaloval:com.redhat.rhsa:tst:20130270010
          • commentjakarta-commons-httpclient-demo is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20130270011
        • AND
          • commentjakarta-commons-httpclient-manual is earlier than 1:3.1-0.7.el6_3
            ovaloval:com.redhat.rhsa:tst:20130270012
          • commentjakarta-commons-httpclient-manual is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20130270013
        • AND
          • commentjakarta-commons-httpclient-javadoc is earlier than 1:3.1-0.7.el6_3
            ovaloval:com.redhat.rhsa:tst:20130270014
          • commentjakarta-commons-httpclient-javadoc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20130270015
        • AND
          • commentjakarta-commons-httpclient is earlier than 1:3.1-0.7.el6_3
            ovaloval:com.redhat.rhsa:tst:20130270016
          • commentjakarta-commons-httpclient is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20130270017
    rhsa
    idRHSA-2013:0270
    released2013-02-19
    severityModerate
    titleRHSA-2013:0270: jakarta-commons-httpclient security update (Moderate)
  • rhsa
    idRHSA-2013:0679
  • rhsa
    idRHSA-2013:0680
  • rhsa
    idRHSA-2013:0681
  • rhsa
    idRHSA-2013:0682
  • rhsa
    idRHSA-2013:1147
  • rhsa
    idRHSA-2013:1853
  • rhsa
    idRHSA-2014:0224
  • rhsa
    idRHSA-2017:0868
rpms
  • jakarta-commons-httpclient-1:3.0-7jpp.2
  • jakarta-commons-httpclient-1:3.1-0.7.el6_3
  • jakarta-commons-httpclient-debuginfo-1:3.0-7jpp.2
  • jakarta-commons-httpclient-debuginfo-1:3.1-0.7.el6_3
  • jakarta-commons-httpclient-demo-1:3.0-7jpp.2
  • jakarta-commons-httpclient-demo-1:3.1-0.7.el6_3
  • jakarta-commons-httpclient-javadoc-1:3.0-7jpp.2
  • jakarta-commons-httpclient-javadoc-1:3.1-0.7.el6_3
  • jakarta-commons-httpclient-manual-1:3.0-7jpp.2
  • jakarta-commons-httpclient-manual-1:3.1-0.7.el6_3
  • jakarta-commons-httpclient-1:3.1-2.1_patch_01.ep5.el4
  • jakarta-commons-httpclient-1:3.1-2.1_patch_01.ep5.el5
  • jakarta-commons-httpclient-1:3.1-2_patch_01.ep5.el6
  • jakarta-commons-httpclient-1:3.1-2.1_patch_01.ep5.el4
  • jakarta-commons-httpclient-1:3.1-2.1_patch_01.ep5.el5
  • jakarta-commons-httpclient-1:3.1-2_patch_01.ep5.el6
  • redhat-support-plugin-rhev-0:3.3.0-14.el6ev