Security Bypass Affecting ca.juliusdavies:not-yet-commons-ssl Open this link in a new tab package, versions [0.3.11] [0.3.9]


0.0
medium
  • Attack Complexity

    Low

  • User Interaction

    Required

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-CAJULIUSDAVIES-30073

  • published

    20 Aug 2014

  • disclosed

    20 Aug 2014

  • credit

    Arun Babu Neelicattu

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

ca.juliusdavies:not-yet-commons-ssl is a Java SSL component library.

Affected versions of this package are vulnerable to Security Bypass. The package does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.