You are viewing a plain text version of this content. The canonical link for it is here.
Posted to c-dev@axis.apache.org by "Bill Blough (Jira)" <ji...@apache.org> on 2020/01/28 17:53:00 UTC
[jira] [Comment Edited] (AXIS2C-1619) CVE-2012-6107: SSL/TLS
Hostname validation
[ https://issues.apache.org/jira/browse/AXIS2C-1619?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16920249#comment-16920249 ]
Bill Blough edited comment on AXIS2C-1619 at 1/28/20 5:52 PM:
--------------------------------------------------------------
Code to validate peer name (CN/SAN) added in r1866225 and r1866245. Behavior can be toggled via axis2_http_client, and currently defaults to disabled for backwards compatibility reasons. Will default to enabled in a future release.
was (Author: bblough):
Code to validate peer name (CN/SAN) added in r1866225. Behavior can be toggled via axis2_http_client, and currently defaults to disabled for backwards compatibility reasons. Will default to enabled in a future release.
> CVE-2012-6107: SSL/TLS Hostname validation
> ------------------------------------------
>
> Key: AXIS2C-1619
> URL: https://issues.apache.org/jira/browse/AXIS2C-1619
> Project: Axis2-C
> Issue Type: Bug
> Components: transport/http
> Reporter: Seth Arnold
> Priority: Major
>
> I've looked through the source code and cannot find any peer hostname validation code. It appears to me that Axis2/c is vulnerable to the problems discussed in this paper: http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
> Have I overlooked the TLS / SSL peer name validation?
> Thanks
--
This message was sent by Atlassian Jira
(v8.3.4#803005)
---------------------------------------------------------------------
To unsubscribe, e-mail: c-dev-unsubscribe@axis.apache.org
For additional commands, e-mail: c-dev-help@axis.apache.org