GitLab::API::v4 through 0.26 does not verify TLS certificates when
connecting to a GitLab server, enabling machine-in-the-middle attacks.
Author | Note |
---|---|
jslarraz | Fixing this issue may introduce a regression when this package is used to interact with self-managed GitLab servers using self-signed certificates. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libgitlab-api-v4-perl | < any | UNKNOWN |
ubuntu | 20.04 | noarch | libgitlab-api-v4-perl | < any | UNKNOWN |
ubuntu | 22.04 | noarch | libgitlab-api-v4-perl | < any | UNKNOWN |
ubuntu | 23.10 | noarch | libgitlab-api-v4-perl | < any | UNKNOWN |
ubuntu | 24.04 | noarch | libgitlab-api-v4-perl | < any | UNKNOWN |
www.openwall.com/lists/oss-security/2023/04/29/1
www.openwall.com/lists/oss-security/2023/05/03/3
www.openwall.com/lists/oss-security/2023/05/03/5
blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
github.com/chansen/p5-http-tiny/pull/151
launchpad.net/bugs/cve/CVE-2023-31485
nvd.nist.gov/vuln/detail/CVE-2023-31485
security-tracker.debian.org/tracker/CVE-2023-31485
www.cve.org/CVERecord?id=CVE-2023-31485
www.openwall.com/lists/oss-security/2023/04/18/14