{"id":"CVE-2013-2037","details":"httplib2 0.7.2, 0.8, and earlier, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.","aliases":["GHSA-q48q-77qv-cf9p","PYSEC-2014-81"],"modified":"2026-04-10T03:42:46.985735Z","published":"2014-01-18T21:55:03Z","references":[{"type":"ADVISORY","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706602"},{"type":"ADVISORY","url":"http://code.google.com/p/httplib2/issues/detail?id=282"},{"type":"ADVISORY","url":"http://seclists.org/oss-sec/2013/q2/257"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/52179"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1948-1"},{"type":"ARTICLE","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706602"},{"type":"ARTICLE","url":"http://seclists.org/oss-sec/2013/q2/257"},{"type":"EVIDENCE","url":"http://code.google.com/p/httplib2/issues/detail?id=282"},{"type":"EVIDENCE","url":"https://bugs.launchpad.net/httplib2/+bug/1175272"},{"type":"FIX","url":"https://bugs.launchpad.net/httplib2/+bug/1175272"},{"type":"REPORT","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706602"}],"schema_version":"1.7.5"}