Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument.
References
Link Resource
http://www.openwall.com/lists/oss-security/2015/03/23/7 Mailing List VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1202837 Issue Tracking Third Party Advisory VDB Entry
https://github.com/benoitc/restkit/issues/140 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-08-09T18:00:00

Updated: 2017-08-09T17:57:01

Reserved: 2015-03-23T00:00:00


Link: CVE-2015-2674

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-08-09T18:29:01.153

Modified: 2017-08-21T15:00:33.017


Link: CVE-2015-2674

JSON object: View

cve-icon Redhat Information

No data.

CWE