{ "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2191", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof Bugzilla servers via a crafted certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130619 [CVE identifier assignment notification] CVE-2013-2191 python-bugzilla: Does not verify Bugzilla server certificate", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/06/19/6" }, { "name": "openSUSE-SU-2013:1155", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html" }, { "name": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef", "refsource": "CONFIRM", "url": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef" }, { "name": "openSUSE-SU-2013:1154", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=951594", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=951594" }, { "name": "[python-bugzilla] 20130619 ANNOUNCE: python-bugzilla 0.9.0 released", "refsource": "MLIST", "url": "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html" } ] } }