Improper Input Validation Affecting python-glanceclient package, versions <1:0.9.0-2


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-PYTHONGLANCECLIENT-1557684
  • published28 Aug 2013
  • disclosed28 Aug 2013

Introduced: 28 Aug 2013

CVE-2013-4111  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Debian:12 python-glanceclient to version 1:0.9.0-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-glanceclient package and not the python-glanceclient package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVSS Scores

version 3.1