Vulnerability Details CVE-2012-5786
The wsdl_first_https sample code in distribution/src/main/release/samples/wsdl_first_https/src/main/ in Apache CXF before 2.7.0 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. NOTE: The vendor states that the sample had specifically used a flag to bypass the DN check
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 32.9%
CVSS Severity
CVSS v2 Score 5.8
Products affected by CVE-2012-5786
-
cpe:2.3:a:apache:cxf:2.0.10
-
cpe:2.3:a:apache:cxf:2.0.11
-
cpe:2.3:a:apache:cxf:2.0.12
-
cpe:2.3:a:apache:cxf:2.0.13
-
cpe:2.3:a:apache:cxf:2.0.6
-
cpe:2.3:a:apache:cxf:2.0.7
-
cpe:2.3:a:apache:cxf:2.0.8
-
cpe:2.3:a:apache:cxf:2.0.9
-
-
cpe:2.3:a:apache:cxf:2.1.0
-
cpe:2.3:a:apache:cxf:2.1.1
-
cpe:2.3:a:apache:cxf:2.1.10
-
cpe:2.3:a:apache:cxf:2.1.2
-
cpe:2.3:a:apache:cxf:2.1.3
-
cpe:2.3:a:apache:cxf:2.1.4
-
cpe:2.3:a:apache:cxf:2.1.5
-
cpe:2.3:a:apache:cxf:2.1.6
-
cpe:2.3:a:apache:cxf:2.1.7
-
cpe:2.3:a:apache:cxf:2.1.8
-
cpe:2.3:a:apache:cxf:2.1.9
-
cpe:2.3:a:apache:cxf:2.2.0
-
cpe:2.3:a:apache:cxf:2.2.1
-
cpe:2.3:a:apache:cxf:2.2.10
-
cpe:2.3:a:apache:cxf:2.2.11
-
cpe:2.3:a:apache:cxf:2.2.12
-
cpe:2.3:a:apache:cxf:2.2.2
-
cpe:2.3:a:apache:cxf:2.2.3
-
cpe:2.3:a:apache:cxf:2.2.4
-
cpe:2.3:a:apache:cxf:2.2.5
-
cpe:2.3:a:apache:cxf:2.2.6
-
cpe:2.3:a:apache:cxf:2.2.7
-
cpe:2.3:a:apache:cxf:2.2.8
-
cpe:2.3:a:apache:cxf:2.2.9
-
cpe:2.3:a:apache:cxf:2.3.0
-
cpe:2.3:a:apache:cxf:2.3.1
-
cpe:2.3:a:apache:cxf:2.3.10
-
cpe:2.3:a:apache:cxf:2.3.11
-
cpe:2.3:a:apache:cxf:2.3.2
-
cpe:2.3:a:apache:cxf:2.3.3
-
cpe:2.3:a:apache:cxf:2.3.4
-
cpe:2.3:a:apache:cxf:2.3.5
-
cpe:2.3:a:apache:cxf:2.3.6
-
cpe:2.3:a:apache:cxf:2.3.7
-
cpe:2.3:a:apache:cxf:2.3.8
-
cpe:2.3:a:apache:cxf:2.3.9
-
cpe:2.3:a:apache:cxf:2.4.0
-
cpe:2.3:a:apache:cxf:2.4.1
-
cpe:2.3:a:apache:cxf:2.4.10
-
cpe:2.3:a:apache:cxf:2.4.2
-
cpe:2.3:a:apache:cxf:2.4.3
-
cpe:2.3:a:apache:cxf:2.4.4
-
cpe:2.3:a:apache:cxf:2.4.5
-
cpe:2.3:a:apache:cxf:2.4.6
-
cpe:2.3:a:apache:cxf:2.4.7
-
cpe:2.3:a:apache:cxf:2.4.8
-
cpe:2.3:a:apache:cxf:2.4.9
-
cpe:2.3:a:apache:cxf:2.5.0
-
cpe:2.3:a:apache:cxf:2.5.1
-
cpe:2.3:a:apache:cxf:2.5.10
-
cpe:2.3:a:apache:cxf:2.5.11
-
cpe:2.3:a:apache:cxf:2.5.2
-
cpe:2.3:a:apache:cxf:2.5.3
-
cpe:2.3:a:apache:cxf:2.5.4
-
cpe:2.3:a:apache:cxf:2.5.5
-
cpe:2.3:a:apache:cxf:2.5.6
-
cpe:2.3:a:apache:cxf:2.5.7
-
cpe:2.3:a:apache:cxf:2.5.8
-
cpe:2.3:a:apache:cxf:2.5.9
-
cpe:2.3:a:apache:cxf:2.6.0
-
cpe:2.3:a:apache:cxf:2.6.1
-
cpe:2.3:a:apache:cxf:2.6.10
-
cpe:2.3:a:apache:cxf:2.6.11
-
cpe:2.3:a:apache:cxf:2.6.12
-
cpe:2.3:a:apache:cxf:2.6.13
-
cpe:2.3:a:apache:cxf:2.6.14
-
cpe:2.3:a:apache:cxf:2.6.15
-
cpe:2.3:a:apache:cxf:2.6.16
-
cpe:2.3:a:apache:cxf:2.6.17
-
cpe:2.3:a:apache:cxf:2.6.2
-
cpe:2.3:a:apache:cxf:2.6.3
-
cpe:2.3:a:apache:cxf:2.6.4
-
cpe:2.3:a:apache:cxf:2.6.5
-
cpe:2.3:a:apache:cxf:2.6.6
-
cpe:2.3:a:apache:cxf:2.6.7
-
cpe:2.3:a:apache:cxf:2.6.8
-
cpe:2.3:a:apache:cxf:2.6.9