Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Restkit | Restkit | - (including) | - (including) |
Python-restkit | Ubuntu | artful | * |
Python-restkit | Ubuntu | bionic | * |
Python-restkit | Ubuntu | cosmic | * |
Python-restkit | Ubuntu | esm-apps/bionic | * |
Python-restkit | Ubuntu | esm-apps/xenial | * |
Python-restkit | Ubuntu | precise | * |
Python-restkit | Ubuntu | trusty | * |
Python-restkit | Ubuntu | upstream | * |
Python-restkit | Ubuntu | utopic | * |
Python-restkit | Ubuntu | vivid | * |
Python-restkit | Ubuntu | wily | * |
Python-restkit | Ubuntu | xenial | * |
Python-restkit | Ubuntu | yakkety | * |
Python-restkit | Ubuntu | zesty | * |