{"api_version":"1","generated_at":"2026-04-22T22:48:01+00:00","cve":"CVE-2012-5783","urls":{"html":"https://cve.report/CVE-2012-5783","api":"https://cve.report/api/cve/CVE-2012-5783.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2012-5783","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2012-5783"},"summary":{"title":"CVE-2012-5783","description":"Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2012-11-04 22:55:00","updated_at":"2021-04-23 17:28:00"},"problem_types":["CWE-295"],"metrics":[],"references":[{"url":"http://rhn.redhat.com/errata/RHSA-2013-0680.html","name":"RHSA-2013:0680","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-0270.html","name":"RHSA-2013:0270","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf","name":"http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf","refsource":"MISC","tags":["Exploit"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-0682.html","name":"RHSA-2013:0682","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1147.html","name":"RHSA-2013:1147","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2769-1","name":"USN-2769-1","refsource":"UBUNTU","tags":[],"title":"USN-2769-1: Apache Commons HttpClient vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1853.html","name":"RHSA-2013:1853","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://issues.apache.org/jira/browse/HTTPCLIENT-1265","name":"https://issues.apache.org/jira/browse/HTTPCLIENT-1265","refsource":"CONFIRM","tags":[],"title":"[HTTPCLIENT-1265] Insecure certificate validation CVE-2012-5783 - ASF JIRA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00040.html","name":"openSUSE-SU-2013:0622","refsource":"SUSE","tags":[],"title":"openSUSE-SU-2013:0622-1: moderate: jakarta-commons-httpclient: enhance S","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-0679.html","name":"RHSA-2013:0679","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0224.html","name":"RHSA-2014:0224","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00041.html","name":"openSUSE-SU-2013:0623","refsource":"SUSE","tags":[],"title":"openSUSE-SU-2013:0623-1: moderate: jakarta-commons-httpclient3: enhance","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00053.html","name":"openSUSE-SU-2013:0638","refsource":"SUSE","tags":[],"title":"openSUSE-SU-2013:0638-1: moderate: jakarta-commons-httpclient3: enhance","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2017:0868","name":"RHSA-2017:0868","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/79984","name":"apache-commons-ssl-spoofing(79984)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2013-02/msg00078.html","name":"openSUSE-SU-2013:0354","refsource":"SUSE","tags":[],"title":"openSUSE-SU-2013:0354-1: moderate: jakarta-commons-httpclient3: Add SSL","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-0681.html","name":"RHSA-2013:0681","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/58073","name":"58073","refsource":"BID","tags":[],"title":"","mime":"inode/x-empty","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2012-5783","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5783","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"amazon","cpe5":"flexible_payments_service","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"amazon","cpe5":"flexible_payments_service","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"commons-httpclient","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"commons-httpclient","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"httpclient","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"15.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5783","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"15.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2012-5783","qid":"330135","title":"IBM Advanced Interactive eXecutive (AIX) Secure Sockets Layer (SSL) server spoof due to Apache Commons HttpClient (commonshttp_advisory)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2012-5783","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"RHSA-2013:0681","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-0681.html"},{"name":"https://issues.apache.org/jira/browse/HTTPCLIENT-1265","refsource":"CONFIRM","url":"https://issues.apache.org/jira/browse/HTTPCLIENT-1265"},{"name":"openSUSE-SU-2013:0622","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00040.html"},{"name":"RHSA-2013:0680","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-0680.html"},{"name":"RHSA-2017:0868","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2017:0868"},{"name":"openSUSE-SU-2013:0354","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2013-02/msg00078.html"},{"name":"58073","refsource":"BID","url":"http://www.securityfocus.com/bid/58073"},{"name":"apache-commons-ssl-spoofing(79984)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/79984"},{"name":"RHSA-2013:0270","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-0270.html"},{"name":"RHSA-2013:0682","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-0682.html"},{"name":"openSUSE-SU-2013:0638","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00053.html"},{"name":"openSUSE-SU-2013:0623","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00041.html"},{"name":"RHSA-2013:1853","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-1853.html"},{"name":"http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf","refsource":"MISC","url":"http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf"},{"name":"RHSA-2013:0679","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-0679.html"},{"name":"RHSA-2013:1147","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-1147.html"},{"name":"USN-2769-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2769-1"},{"name":"RHSA-2014:0224","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0224.html"}]}},"nvd":{"publishedDate":"2012-11-04 22:55:00","lastModifiedDate":"2021-04-23 17:28:00","problem_types":["CWE-295"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:httpclient:3.1:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2012","CveId":"5783","Ordinal":"58833","Title":"CVE-2012-5783","CVE":"CVE-2012-5783","Year":"2012"},"notes":[{"CveYear":"2012","CveId":"5783","Ordinal":"1","NoteData":"Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.","Type":"Description","Title":null},{"CveYear":"2012","CveId":"5783","Ordinal":"2","NoteData":"2012-11-04","Type":"Other","Title":"Published"},{"CveYear":"2012","CveId":"5783","Ordinal":"3","NoteData":"2018-01-04","Type":"Other","Title":"Modified"}]}}}