Bug 873906 (CVE-2011-5241) - CVE-2011-5241 php-pear-Service-Twitter: does not verify that a server hostname matches a domain name in the CN or subjectAltName field of X.509 certs
Summary: CVE-2011-5241 php-pear-Service-Twitter: does not verify that a server hostnam...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-5241
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 873907 873908
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-11-06 23:02 UTC by Vincent Danen
Modified: 2021-10-19 21:57 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-19 21:57:39 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2012-11-06 23:02:10 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-5241 to
the following vulnerability:

Name: CVE-2011-5241
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5241
Assigned: 20121106
Reference: http://www.unrest.ca/peerjacking

Services_Twitter 0.6.3 does not verify that the server hostname
matches a domain name in the subject's Common Name (CN) or
subjectAltName field of the X.509 certificate, which allows
man-in-the-middle attackers to spoof SSL servers via an arbitrary
valid certificate.

Comment 1 Vincent Danen 2012-11-06 23:05:45 UTC
The flawed code is in Services/Twitter.php:

489     public function getRequest()
...
494         if ($this->getOption('use_ssl')) {                                                                                                                                                                                                                                  
495             // XXX ssl won't work with ssl_verify_peer set to true, which is.
496             // the default in HTTP_Request2
497             $this->request->setConfig('ssl_verify_peer', false);
498         }
499         return $this->request;

So even if it's configured to use SSL, it won't.  Seems like the real problem might be in php-pear-HTTP-Request2, if the above comment is actually accurate for the currently shipped version.

Comment 2 Vincent Danen 2012-11-06 23:06:29 UTC
Created php-pear-Services-Twitter tracking bugs for this issue

Affects: fedora-all [bug 873907]
Affects: epel-6 [bug 873908]

Comment 3 Vincent Danen 2012-11-13 15:36:01 UTC
Sorry, this should be 2011, not 2012.


Note You need to log in before you can comment on or make changes to this bug.