5.8

CVE-2012-5784

Exploit

Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Data is provided by the National Vulnerability Database (NVD)
ApacheActivemq Version <= 5.7.0
ApacheAxis Version <= 1.4
ApacheAxis Version- Updatealpha1
ApacheAxis Version- Updatealpha2
ApacheAxis Version- Updatealpha3
ApacheAxis Version- Updatebeta1
ApacheAxis Version- Updatebeta2
ApacheAxis Version- Updatebeta3
ApacheAxis Version1.0
ApacheAxis Version1.0 Updatebeta
ApacheAxis Version1.0 Updaterc1
ApacheAxis Version1.0 Updaterc2
ApacheAxis Version1.1
ApacheAxis Version1.1 Updatebeta
ApacheAxis Version1.1 Updaterc1
ApacheAxis Version1.1 Updaterc2
ApacheAxis Version1.2
ApacheAxis Version1.2 Updatealpha
ApacheAxis Version1.2 Updatebeta1
ApacheAxis Version1.2 Updatebeta2
ApacheAxis Version1.2 Updatebeta3
ApacheAxis Version1.2 Updaterc1
ApacheAxis Version1.2 Updaterc2
ApacheAxis Version1.2 Updaterc3
ApacheAxis Version1.2.1
ApacheAxis Version1.3
PaypalMass Pay Version-
PaypalPayments Pro Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.57% 0.809
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.