CVE-2021-44273

e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:e2bn:e2guardian:*:*:*:*:*:*:*:*

History

13 Sep 2023, 00:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/09/msg00010.html -

11 Jan 2022, 17:50

Type Values Removed Values Added
First Time E2bn
E2bn e2guardian
CPE cpe:2.3:a:e2bn:e2guardian:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 7.4
CWE CWE-295
References (MISC) https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2 - (MISC) https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2 - Patch, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/12/23/2 - (MLIST) http://www.openwall.com/lists/oss-security/2021/12/23/2 - Mailing List, Third Party Advisory
References (MISC) https://github.com/e2guardian/e2guardian/issues/707 - (MISC) https://github.com/e2guardian/e2guardian/issues/707 - Exploit, Issue Tracking, Patch, Third Party Advisory

23 Dec 2021, 22:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/23/2 -

23 Dec 2021, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-23 12:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-44273

Mitre link : CVE-2021-44273

CVE.ORG link : CVE-2021-44273


JSON object : View

Products Affected

e2bn

  • e2guardian
CWE
CWE-295

Improper Certificate Validation