CPANSA-LWP-Protocol-https-2014-3230: LWP-Protocol-https vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2020-01-28T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2020-01-28T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 5.9 Severity Medium
Original language Language en
Also referred to

Vulnerability Description

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

Vulnerabilities

CVE-2014-3230

Vulnerability Description

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

Weakness CWE-295 : Improper Certificate Validation

Product status

Known affected
Product Score
LWP-Protocol-https greater than or equal 6.04 and less than or equal 6.06
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N 5.9 Medium
2.0 AV:N/AC:M/Au:N/C:N/I:P/A:N 4.3 Medium
Fixed

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Tue Jan 28 00:00:00 2020 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/