no SSL certificate verify
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
moonshot-gss-eap (Ubuntu) |
New
|
Undecided
|
Unassigned |
Bug Description
Hi developers:
We made a large scale security static analysis on several open source projects, and found some mistakes in moonshot-
static struct wpabuf * openssl_
*conn, const struct wpabuf *in_data,int server)
{
[...]
if (server)
res = SSL_accept(
else
res = SSL_connect(
[...]
}
You create SSL connect and then start to execute read/write operation without verify certificate,which can lead to MITM attack and cause leakage of sensitive data.We recommand you add cert verify operation such as SSL_CTX_set_verify or SSL_get_
information type: | Private Security → Public |
Can you share more information on this, such as the tool you used for static analysis or more detailed output? Ideal would be the code path that your tool believes exhibits the behaviour.
libeap's internal method tls_connection_ set_verify( ) should be called to set the verification callback for the context before SSL_connect() or SSL_accept() is reached - if there is a code path that makes this not be the case, it's not immediately obvious.