Man-in-the-Middle (MitM) Affecting python-swiftclient package, versions [1,2.0.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Man-in-the-Middle (MitM) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PYTHONSWIFTCLIENT-40021
  • published18 Nov 2013
  • disclosed18 Nov 2013
  • creditUnknown

Introduced: 18 Nov 2013

CVE-2013-6396  (opens in a new tab)
CWE-310  (opens in a new tab)

How to fix?

Upgrade to version 2.0.0 or greater.

Overview

python-swiftclient is a OpenStack Object Storage API Client Library.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM) attacks. The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVSS Base Scores

version 3.1