Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument.
https://github.com/benoitc/restkit/issues/140
https://bugzilla.redhat.com/show_bug.cgi?id=1202837
http://www.openwall.com/lists/oss-security/2015/03/23/7
Source: Mitre, NVD
Published: 2017-08-09
Updated: 2025-04-20
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 5.9
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS: 0.00363