Description
The software communicates with a host that provides a certificate, but the software does not properly ensure that the certificate is actually associated with that host.
Modes of Introduction:
– Architecture and Design
Likelihood of Exploit: High
Related Weaknesses
Consequences
Access Control: Gain Privileges or Assume Identity
The data read from the system vouched for by the certificate may not be from the expected system.
Authentication, Other: Other
Trust afforded to the system in question – based on the malicious certificate – may allow for spoofing or redirection attacks.
Potential Mitigations
Phase: Architecture and Design
Description:
Fully check the hostname of the certificate and provide the user with adequate information about the nature of the problem and how to proceed.
Phase: Implementation
Description:
If certificate pinning is being used, ensure that all relevant properties of the certificate are fully validated before the certificate is pinned, including the hostname.
CVE References
- CVE-2012-5810
- Mobile banking application does not verify hostname, leading to financial loss.
- CVE-2012-5811
- Mobile application for printing documents does not verify hostname, allowing attackers to read sensitive documents.
- CVE-2012-5807
- Software for electronic checking does not verify hostname, leading to financial loss.
- CVE-2012-3446
- Cloud-support library written in Python uses incorrect regular expression when matching hostname.
- CVE-2009-2408
- Web browser does not correctly handle ‘’ character (NUL) in Common Name, allowing spoofing of https sites.
- CVE-2012-0867
- Database program truncates the Common Name during hostname verification, allowing spoofing.
- CVE-2010-2074
- Incorrect handling of ‘’ character (NUL) in hostname verification allows spoofing.
- CVE-2009-4565
- Mail server’s incorrect handling of ‘’ character (NUL) in hostname verification allows spoofing.
- CVE-2009-3767
- LDAP server’s incorrect handling of ‘’ character (NUL) in hostname verification allows spoofing.
- CVE-2012-5806
- Payment processing module does not verify hostname when connecting to PayPal using PHP fsockopen function.
- CVE-2012-2993
- Smartphone device does not verify hostname, allowing spoofing of mail services.
- CVE-2012-5804
- E-commerce module does not verify hostname when connecting to payment site.
- CVE-2012-5824
- Chat application does not validate hostname, leading to loss of privacy.
- CVE-2012-5822
- Application uses third-party library that does not validate hostname.
- CVE-2012-5819
- Cloud storage management application does not validate hostname.
- CVE-2012-5817
- Java library uses JSSE SSLSocket and SSLEngine classes, which do not verify the hostname.
- CVE-2012-5784
- SOAP platform does not verify the hostname.
- CVE-2012-5782
- PHP library for payments does not verify the hostname.
- CVE-2012-5780
- Merchant SDK for payments does not verify the hostname.
- CVE-2003-0355
- Web browser does not validate Common Name, allowing spoofing of https sites.
More Stories
The Most Dangerous Vulnerabilities in Apache Tomcat and How to Protect Against Them
Apache Tomcat is an open-source web server and servlet container that is widely used in enterprise environments to run Java...
ZDI-CAN-18333: A Critical Zero-Day Vulnerability in Microsoft Windows
Zero-day vulnerabilities are a serious threat to cybersecurity, as they can be exploited by malicious actors to gain unauthorized access...
CWE-669 – Incorrect Resource Transfer Between Spheres
Description The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere,...
CWE-67 – Improper Handling of Windows Device Names
Description The software constructs pathnames from user input, but it does not handle or incorrectly handles a pathname containing a...
CWE-670 – Always-Incorrect Control Flow Implementation
Description The code contains a control flow path that does not reflect the algorithm that the path is intended to...
CWE-671 – Lack of Administrator Control over Security
Description The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect...