CVE-2023-31485
Publication date 29 April 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
GitLab::API::v4 through 0.26 does not verify TLS certificates when connecting to a GitLab server, enabling machine-in-the-middle attacks.
Status
Package | Ubuntu Release | Status |
---|---|---|
libgitlab-api-v4-perl | 24.04 LTS noble |
Not affected
|
22.04 LTS jammy | Ignored fix is likely to introduce a regression on existing deployments | |
20.04 LTS focal | Ignored fix is likely to introduce a regression on existing deployments | |
18.04 LTS bionic | Ignored fix is likely to introduce a regression on existing deployments | |
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Ignored end of standard support |
Notes
jslarraz
Fixing this issue may introduce a regression when this package is used to interact with self-managed GitLab servers using self-signed certificates.
Patch details
Package | Patch details |
---|---|
libgitlab-api-v4-perl |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Other references
- https://www.openwall.com/lists/oss-security/2023/04/18/14
- https://github.com/chansen/p5-http-tiny/pull/151
- https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
- http://www.openwall.com/lists/oss-security/2023/04/29/1
- http://www.openwall.com/lists/oss-security/2023/05/03/3
- http://www.openwall.com/lists/oss-security/2023/05/03/5
- https://www.cve.org/CVERecord?id=CVE-2023-31485