File tree Expand file tree Collapse file tree 1 file changed +34
-0
lines changed Expand file tree Collapse file tree 1 file changed +34
-0
lines changed Original file line number Diff line number Diff line change
1
+ ``` toml
2
+ [advisory ]
3
+ id = " HSEC-2023-0005"
4
+ cwe = [295 ]
5
+ keywords = [" x509" , " pki" , " mitm" ]
6
+ aliases = [" CVE-2013-0243" ]
7
+
8
+ [[affected ]]
9
+ package = " tls-extra"
10
+ cvss = " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
11
+
12
+ [[affected .versions ]]
13
+ introduced = " 0.1.0"
14
+ fixed = " 0.4.6.1"
15
+
16
+ [[references ]]
17
+ type = " DISCUSSION"
18
+ url = " https://www.openwall.com/lists/oss-security/2013/01/30/6"
19
+ [[references ]]
20
+ type = " REPORT"
21
+ url = " https://github.com/haskell-tls/hs-tls/issues/29"
22
+ [[references ]]
23
+ type = " FIX"
24
+ url = " https://github.com/haskell-tls/hs-tls/commit/15885c0649ceabd2f4d2913df8ac6dc63d6b3b37"
25
+ ```
26
+
27
+ # tls-extra: certificate validation does not check Basic Constraints
28
+
29
+ * tls-extra* does not check the Basic Constraints extension of a
30
+ certificate in certificate chain processing. Any certificate is
31
+ treated as a CA certificate. As a consequence, anyone who has a
32
+ valid certificate can use it to sign another one (with an arbitrary
33
+ subject DN/domain name embedded into it) and have it accepted by
34
+ * tls* . This allows MITM attacks on TLS connections.
You can’t perform that action at this time.
0 commit comments