In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation. Since the verify parameter was hard-coded in all request functions, it was not possible to override the setting. As a result, tools making use of this class, such as the pki-server command, may have been vulnerable to Person-in-the-Middle attacks in certain non-localhost use cases. This is fixed in 10.9.0-b1.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dogtagpki | Dogtagpki | * | 10.8.3 (including) |
Red Hat Enterprise Linux 8 | RedHat | pki-core:10.6-8030020200911215836.5ff1562f | * |
Red Hat Enterprise Linux 8 | RedHat | pki-deps:10.6-8030020200527165326.30b713e6 | * |
Dogtag-pki | Ubuntu | bionic | * |
Dogtag-pki | Ubuntu | eoan | * |
Dogtag-pki | Ubuntu | esm-apps/bionic | * |
Dogtag-pki | Ubuntu | esm-apps/xenial | * |
Dogtag-pki | Ubuntu | trusty | * |
Dogtag-pki | Ubuntu | upstream | * |
Dogtag-pki | Ubuntu | xenial | * |