ovirt-engine-sdk-python improper validation of hostname in x.509 certificate
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Oct 8, 2024
Package
Affected versions
< 3.4.0.7
>= 3.5.0.0, < 3.5.0.4
Patched versions
3.4.0.7
3.5.0.4
Description
Published by the National Vulnerability Database
Jan 2, 2020
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Oct 19, 2023
Last updated
Oct 8, 2024
ovirt-engine-sdk-python before 3.4.0.7 and 3.5.0.4 does not verify that the hostname of the remote endpoint matches the Common Name (CN) or subjectAltName as specified by its x.509 certificate in a TLS/SSL session. This could allow man-in-the-middle attackers to spoof remote endpoints via an arbitrary valid certificate.
References