CVE-2013-4111: python-glanceclient vulnerable to SSL server spoofing due to unverified X.509 certificate
(updated )
The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject’s Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
- access.redhat.com/errata/RHSA-2013:1200
- access.redhat.com/security/cve/CVE-2013-4111
- bugs.launchpad.net/ossa/+bug/1192229
- bugzilla.redhat.com/show_bug.cgi?id=989738
- github.com/advisories/GHSA-qgfg-gvff-523v
- github.com/jaypipes/python-glanceclient
- github.com/openstack/python-glanceclient/blob/master/doc/source/index.rst
- github.com/pypa/advisory-database/tree/main/vulns/python-glanceclient/PYSEC-2013-11.yaml
- nvd.nist.gov/vuln/detail/CVE-2013-4111
Detect and mitigate CVE-2013-4111 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →