CVE-2014-3230

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
References
Link Resource
http://www.openwall.com/lists/oss-security/2014/05/02/8 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/04/1 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/06/8 Mailing List Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746579 Exploit Mailing List Patch Third Party Advisory
https://github.com/libwww-perl/lwp-protocol-https/pull/14 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:lwp\:\:protocol\:\:https_project:lwp\:\:protocol\:\:https:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-01-28 16:15

Updated : 2023-12-10 13:13


NVD link : CVE-2014-3230

Mitre link : CVE-2014-3230

CVE.ORG link : CVE-2014-3230


JSON object : View

Products Affected

lwp\

  • \
CWE
CWE-295

Improper Certificate Validation