CVE-2022-2996

A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:python-scciclient_project:python-scciclient:0.11.0:*:*:*:*:python:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:02

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html - Mailing List, Third Party Advisory
References () https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c - Patch, Third Party Advisory () https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c - Patch, Third Party Advisory

Information

Published : 2022-09-01 18:15

Updated : 2024-11-21 07:02


NVD link : CVE-2022-2996

Mitre link : CVE-2022-2996

CVE.ORG link : CVE-2022-2996


JSON object : View

Products Affected

python-scciclient_project

  • python-scciclient

debian

  • debian_linux
CWE
CWE-295

Improper Certificate Validation