Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. net-ldap
  4. ›
  5. CVE-2017-17718

CVE-2017-17718: No validation of hostname certificate

December 17, 2017 (updated January 5, 2018)

Net-ldap does not validate the hostname certificate. Ruby is relying on OpenSSL, and one common mistake made by users of OpenSSL is to assume that OpenSSL will validate the hostname in the server’s certificate. did not perform hostname validation. and up contain support for hostname validation, but they still require the user to call a few functions to set it up.

References

  • openwall.com/lists/oss-security/2017/12/17/10
  • ruby-doc.org/stdlib-1.9.3/libdoc/openssl/rdoc/OpenSSL/SSL.html
  • github.com/ruby-ldap/ruby-net-ldap/issues/258
  • github.com/ruby-ldap/ruby-net-ldap/pull/279

Code Behaviors & Features

Detect and mitigate CVE-2017-17718 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.16.0

Fixed versions

  • 0.16.0

Solution

Update to fixed version or use verify_certificate_identity to validate certificates; see provided link.

Impact 5.9 MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-295: Improper Certificate Validation

Source file

gem/net-ldap/CVE-2017-17718.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:50 +0000.