CVE-2013-2037: httplib2 incorrectly checks SSL certificate
(updated )
httplib2 prior to version 0.10.1, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject’s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
- bugs.launchpad.net/httplib2/+bug/1175272
- github.com/advisories/GHSA-q48q-77qv-cf9p
- github.com/httplib2/httplib2
- github.com/httplib2/httplib2/commit/40cbdcc8586f2292fa0e76a3e8c012f0cc9ed919
- github.com/httplib2/httplib2/issues/5
- github.com/pypa/advisory-database/tree/main/vulns/httplib2/PYSEC-2014-81.yaml
- nvd.nist.gov/vuln/detail/CVE-2013-2037
- web.archive.org/web/20200228052625/http://www.securityfocus.com/bid/52179
Detect and mitigate CVE-2013-2037 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →