python-bugzilla uses the default xmlrpclib transports, which are based on classes in httplib which do not perform server certificate checking. As a result, man-in-the-middle attacks on the HTTPS connection are possible.
It was found that python-bugzilla, a Python library for interacting with Bugzilla instances over XML-RPC functionality, did not perform X.509 certificate verification when using secured SSL connection. A man-in-the-middle (MiTM) attacker could use this flaw to spoof Bugzilla server via an arbitrary certificate. This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
The CVE identifier of CVE-2013-2191 has been assigned to this issue.
This issue affects the versions of the python-bugzilla package, as shipped with Fedora release of 17 and 18. This issue affects the versions of the python-bugzilla package, as shipped with Fedora EPEL-5 and Fedora EPEL-6.
Upstream patch: https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef
Created python-bugzilla tracking bugs for this issue Affects: fedora-all [bug 975961] Affects: epel-all [bug 975962]
python-bugzilla-0.9.0-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
python-bugzilla-0.9.0-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
python-bugzilla-0.9.0-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
python-bugzilla-0.9.0-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.