this python project is vulnerable to MITM as it fails to verify the ssl validity of the remote destination.

Bug #675217 reported by dave b.
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
libcloud (Ubuntu)
Fix Released
Medium
Unassigned

Bug Description

as per my original bug report in libcloud, https://issues.apache.org/jira/browse/LIBCLOUD-55

this python project is vulnerable to MITM as it fails to verify the ssl validity of the remote destination.
urllib / urllib2, httplib.SHTTPConnection do not verify ssl at all by default.
from base.py
class ConnectionKey(object):
""" A Base Connection class to derive from.
""" conn_classes = (httplib.HTTPConnection, httplib.HTTPSConnection)

.... def connect(self, host=None, port=None):
..... connection = self.conn_classesself.secure

this request can be MITMed leading to the compromise of a users API key - where a secured https connection was requested, but can be MITM'ed.

dave b. (d+b)
visibility: private → public
Changed in libcloud (Ubuntu):
status: New → Confirmed
importance: Undecided → Medium
Revision history for this message
Soren Hansen (soren) wrote :

This is fixed with the recent upload of 0.5.0 to Oneiric.

Changed in libcloud (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.