CVE-2011-0633

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
13/05/2011
Last modified:
11/04/2025

Description

The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated. NOTE: it could be argued that this is a design limitation of the Net::HTTPS API, and separate implementations should be independently assigned CVE identifiers for not working around this limitation. However, because this API was modified within LWP, a single CVE identifier has been assigned.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:gisle_aas:libwww-perl:0.01:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:0.02:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:0.03:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:0.04:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.00:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.01:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.02:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.03:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.04:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.05:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.06:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.07:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.08:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.09:*:*:*:*:*:*:*
cpe:2.3:a:gisle_aas:libwww-perl:5.10:*:*:*:*:*:*:*