CVE-2016-10932: HTTPS MitM vulnerability due to lack of hostname verification
(updated )
When used on Windows platforms, all versions of Hyper prior to 0.9.4 did not perform hostname verification when making HTTPS requests.
This allows an attacker to perform MitM attacks by preventing any valid CA-issued certificate, even if there’s a hostname mismatch.
The problem was addressed by leveraging rust-openssl’s built-in support for hostname verification.
References
Detect and mitigate CVE-2016-10932 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →