e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks.
References
Link | Resource |
---|---|
https://github.com/e2guardian/e2guardian/issues/707 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2 | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/12/23/2 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-12-23 04:15
Updated : 2022-01-11 09:50
NVD link : CVE-2021-44273
Mitre link : CVE-2021-44273
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
e2bn
- e2guardian