MEDIUM · 5.8

CVE-2012-5784

Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, doe...

Vulnerability Description

Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVSS Score

5.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
ApacheActivemq<= 5.7.0
ApacheAxis<= 1.4
PaypalMass Pay-
PaypalPayments Pro-
PaypalTransactional Information Soap-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-5784?

CVE-2012-5784 is a vulnerability with a CVSS score of 5.8 (MEDIUM). Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, doe...

How severe is CVE-2012-5784?

CVE-2012-5784 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-5784?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Activemq, Apache Axis, Paypal Mass Pay, Paypal Payments Pro, Paypal Transactional Information Soap.