CVE-2012-0741

MEDIUM5.8/ 10.0
Share:
Published: December 28, 2012 at 11:48 AM
Modified: April 11, 2025 at 12:51 AM
Source: psirt@us.ibm.com

Vulnerability Description

IBM Security AppScan Enterprise before 8.6.0.2 and Rational Policy Tester before 8.5.0.3 do not validate X.509 certificates during use of the Manual Explore Proxy feature, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary certificate.

CVSS Metrics

Base Score
5.8
Severity
MEDIUM
Vector String
AV:N/AC:M/Au:N/C:P/I:P/A:N

Weaknesses (CWE)

Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

IBM Security AppScan Enterprise and Rational Policy Tester are vulnerable to a man-in-the-middle (MITM) attack due to improper X.509 certificate validation within the Manual Explore Proxy feature. This allows attackers to intercept and potentially modify sensitive communications, leading to data breaches and compromise of application security testing results.

02 // Vulnerability Mechanism

Step 1: Setup MITM: The attacker sets up a malicious proxy server, configured to intercept traffic intended for the target application being tested by AppScan Enterprise or Rational Policy Tester. This proxy acts as a man-in-the-middle.

Step 2: Certificate Forgery: The attacker generates a forged X.509 certificate, potentially mimicking the target server's certificate or using a self-signed certificate. This certificate is presented to the client (AppScan or Policy Tester) during the SSL/TLS handshake.

Step 3: Proxy Configuration: The victim (security tester) configures AppScan Enterprise or Rational Policy Tester to use the attacker's proxy server for manual exploration.

Step 4: Traffic Interception: The victim's application traffic is routed through the malicious proxy. Because of the missing certificate validation, the client accepts the attacker's forged certificate without warning.

Step 5: Data Interception and Manipulation: The attacker can now decrypt and inspect the victim's encrypted traffic, potentially stealing sensitive data or modifying requests/responses before they reach the target server. This could include injecting malicious payloads or altering application behavior during security testing.

03 // Deep Technical Analysis

The vulnerability stems from a failure to properly validate X.509 certificates presented by SSL/TLS servers when the Manual Explore Proxy feature is enabled. Specifically, the software does not verify the certificate's authenticity, issuer, or revocation status. This lack of validation allows an attacker to present a forged certificate, establishing a fraudulent SSL/TLS connection. The root cause is likely a missing or disabled certificate verification function within the proxy's SSL/TLS handling code. The software trusts any certificate presented, regardless of its validity, allowing the attacker to decrypt and potentially modify the traffic passing through the proxy.

CVE-2012-0741 - MEDIUM Severity (5.8) | Free CVE Database | 4nuxd