2017-10-16 12:31:07 -04:00
{
2019-03-17 23:06:56 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com" ,
"ID" : "CVE-2010-4340" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:06:56 +00:00
"lang" : "eng" ,
"value" : "libcloud before 0.4.1 does not verify SSL certificates for HTTPS connections, which allows remote attackers to spoof certificates and bypass intended access restrictions via a man-in-the-middle (MITM) attack."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:06:56 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "[libcloud] 20100929 [jira] Closed: (LIBCLOUD-55) this python project is vulnerable to MITM as it fails to verify the ssl validity of the remote destination." ,
"refsource" : "MLIST" ,
"url" : "http://mail-archives.apache.org/mod_mbox/incubator-libcloud/201009.mbox/%3C5860913.463891285776633273.JavaMail.jira@thor%3E"
} ,
{
"name" : "http://wiki.apache.org/incubator/LibcloudSSL" ,
"refsource" : "MISC" ,
"url" : "http://wiki.apache.org/incubator/LibcloudSSL"
} ,
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598463" ,
"refsource" : "CONFIRM" ,
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598463"
} ,
{
"name" : "[libcloud] 20101108 SSL certs checking" ,
"refsource" : "MLIST" ,
"url" : "http://mail-archives.apache.org/mod_mbox/incubator-libcloud/201011.mbox/browser"
} ,
{
"name" : "https://issues.apache.org/jira/browse/LIBCLOUD-55" ,
"refsource" : "CONFIRM" ,
"url" : "https://issues.apache.org/jira/browse/LIBCLOUD-55"
}
]
}
}