PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness

Medium Nessus Network Monitor Plugin ID 6672

Synopsis

The remote web server uses a version of PHP that is affected by a man-in-the-middle attack

Description

PHP versions 5.4.x earlier than 5.4.11 are affected by a weakness in the cURL extension that call allow SSL spoofing and man-in-the-middle attacks.

When attempting to validate a certificate, the cURL library (libcurl) fails to verify that a server hostname matches a domain name in an X.509 certificate's 'Subject Common Name' (CN) or 'SubjectAltName'.

Note that this plugin does not attempt to verify whether the PHP install has been built with the cURL extention but instead relies only on PHP's self-reported version number.

Solution

Upgrade to PHP version 5.4.11 or later.

See Also

http://www.php.net/ChangeLog-5.php#5.4.11

https://bugs.php.net/bug.php?id=63352

https://bugs.php.net/bug.php?id=63795

Plugin Details

Severity: Medium

ID: 6672

Family: Web Servers

Published: 2013/01/22

Modified: 2016/11/23

Dependencies: 8682

Nessus ID: 63622

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 4.8

Temporal Score: 4.6

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php:php

Patch Publication Date: 2013/01/17

Vulnerability Publication Date: 2013/01/17

Reference Information

CVE: CVE-2012-6087

BID: 57104