Improper Certificate Validation Affecting commons-httpclient:commons-httpclient package, versions [,3.1-jenkins-3)


0.0
medium

Snyk CVSS

    Attack Complexity Low
    User Interaction Required

    Threat Intelligence

    EPSS 0.24% (62nd percentile)
Expand this section
NVD
5.4 medium
Expand this section
Red Hat
3.7 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-COMMONSHTTPCLIENT-30083
  • published 25 Mar 2013
  • disclosed 4 Nov 2012
  • credit Unknown

How to fix?

Upgrade commons-httpclient:commons-httpclient to version 3.1-jenkins-3 or higher.

Overview

commons-httpclient:commons-httpclient is a HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Improper Certificate Validation due to not verifying that the requesting server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate. This allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

NOTE: This plugin has been deprecated, but a fix has been released in version 3.1-jenkins-3 on a special Jenkins fork of the project.