Improper Certificate Validation Affecting liblwp-protocol-https-perl package, versions <6.04-3


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.26% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-LIBLWPPROTOCOLHTTPSPERL-525739
  • published27 Jun 2018
  • disclosed28 Jan 2020

Introduced: 27 Jun 2018

CVE-2014-3230  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade Debian:11 liblwp-protocol-https-perl to version 6.04-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream liblwp-protocol-https-perl package and not the liblwp-protocol-https-perl package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

CVSS Scores

version 3.1