Skip to content

Commit 77d02f8

Browse files
frasertweedaleTristanCacqueray
authored andcommitted
HSEC-2023-0005: tls-extra does not check BasicConstraints
1 parent ebb4d19 commit 77d02f8

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
```toml
2+
[advisory]
3+
id = "HSEC-2023-0005"
4+
cwe = [295]
5+
keywords = ["x509", "pki", "mitm"]
6+
aliases = ["CVE-2013-0243"]
7+
8+
[[affected]]
9+
package = "tls-extra"
10+
cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
11+
12+
[[affected.versions]]
13+
introduced = "0.1.0"
14+
fixed = "0.4.6.1"
15+
16+
[[references]]
17+
type = "DISCUSSION"
18+
url = "https://www.openwall.com/lists/oss-security/2013/01/30/6"
19+
[[references]]
20+
type = "REPORT"
21+
url = "https://github.com/haskell-tls/hs-tls/issues/29"
22+
[[references]]
23+
type = "FIX"
24+
url = "https://github.com/haskell-tls/hs-tls/commit/15885c0649ceabd2f4d2913df8ac6dc63d6b3b37"
25+
```
26+
27+
# tls-extra: certificate validation does not check Basic Constraints
28+
29+
*tls-extra* does not check the Basic Constraints extension of a
30+
certificate in certificate chain processing. Any certificate is
31+
treated as a CA certificate. As a consequence, anyone who has a
32+
valid certificate can use it to sign another one (with an arbitrary
33+
subject DN/domain name embedded into it) and have it accepted by
34+
*tls*. This allows MITM attacks on TLS connections.

0 commit comments

Comments
 (0)