Loading HuntDB...

CVE-2013-6422

UNKNOWN
Published 2013-12-23T22:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2013-6422. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-fw5f-w62r-p5ww

Advisory Details

The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.

CVSS Scoring

CVSS Score

5.0

Advisory provided by GitHub Security Advisory Database. Published: May 17, 2022, Modified: May 17, 2022

References

HackerOne Reports

frankyueh
curl
Improper Validation of Certificate with Host Mismatch
Published: 2013-12-23T22:00:00
Last Modified: 2024-08-06T17:39:01.250Z
Copied to clipboard!