|
Message-ID: <78ad4469-23ca-e81d-6a5f-43afc716dfa9@enst-bretagne.fr> Date: Thu, 24 Mar 2022 07:46:31 +0100 From: Gabriel Corona <gabriel.corona@...t-bretagne.fr> To: oss-security@...ts.openwall.com Subject: Re: Lack of TLS certification chain validation in ZAP Proxy On 23/03/2022 22:02, Gabriel Corona wrote: > ZAP proxy does not verify the certificate chain of the HTTPS servers it > connects to. For example, it connects without warning to servers > presenting a self-signed certificate, an expired certificate, etc. > > This opens up a browser configured to use ZAP as an intercepting proxy to: > > 1. man-in-the-middle (MITM) attacks; > 2. DNS rebinding attacks (to HTTPS servers configured as default virtual > server). > This is CVE-2022-27820. Regards, Gabriel Corona
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.