Lucene search

K
githubGitHub Advisory DatabaseGHSA-JF99-2RJ4-JXRM
HistoryMay 17, 2022 - 4:45 a.m.

Transifex command-line client has improper certificate validation

2022-05-1704:45:17
CWE-20
GitHub Advisory Database
github.com
4
transifex
cli
certificate validation
security issue
data transfer

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.7

Confidence

Low

EPSS

0.001

Percentile

35.2%

Transifex command-line client before 0.10 does not validate X.509 certificates for data transfer connections, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-2073.

Affected configurations

Vulners
Node
transifextransifex-clientRange<0.10
VendorProductVersionCPE
transifextransifex-client*cpe:2.3:a:transifex:transifex-client:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.7

Confidence

Low

EPSS

0.001

Percentile

35.2%