A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html | Mailing List Third Party Advisory |
https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html | Mailing List Third Party Advisory |
https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html - Mailing List, Third Party Advisory | |
References | () https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c - Patch, Third Party Advisory |
Information
Published : 2022-09-01 18:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-2996
Mitre link : CVE-2022-2996
CVE.ORG link : CVE-2022-2996
JSON object : View
Products Affected
python-scciclient_project
- python-scciclient
debian
- debian_linux
CWE
CWE-295
Improper Certificate Validation