CVE-2018-17187
CVSS V2 Medium 5.8
CVSS V3 High 7.4
Description
The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise.
Overview
- CVE ID
- CVE-2018-17187
- Assigner
- security@apache.org
- Vulnerability Status
- Analyzed
- Published Version
- 2018-11-13T15:29:00
- Last Modified Date
- 2019-01-31T19:10:53
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:apache:qpid_proton-j:*:*:*:*:*:*:*:* | 1 | OR | 0.3 | 0.29.0 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 5.8
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 4.9
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- HIGH
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 7.4
- Base Severity
- HIGH
- Exploitability Score
- 2.2
- Impact Score
- 5.2
References
Reference URL | Reference Tags |
---|---|
https://qpid.apache.org/cves/CVE-2018-17187.html | Mitigation Vendor Advisory |
https://mail-archives.apache.org/mod_mbox/qpid-users/201811.mbox/%3CCAFitrpQSV73Vz7rJYfLJK7gvEymZSCR5ooWUeU8j4jzRydk-eg%40mail.gmail.com%3E | Mitigation Mailing List Vendor Advisory |
https://issues.apache.org/jira/browse/PROTON-1962 | Vendor Advisory |
http://www.securityfocus.com/bid/105935 | Third Party Advisory VDB Entry |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2018-17187 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17187 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 07:59:46 | Added to TrackCVE | |||
2022-12-03 14:18:23 | 2018-11-13T15:29Z | 2018-11-13T15:29:00 | CVE Published Date | updated |
2022-12-03 14:18:23 | 2019-01-31T19:10:53 | CVE Modified Date | updated | |
2022-12-03 14:18:23 | Analyzed | Vulnerability Status | updated |