Please note that binary patches are not produced for individual vulnerabilities. To obtain the binary fix for a particular vulnerability you should upgrade to an Apache Maven version where that vulnerability has been fixed.
For more information about reporting vulnerabilities, see the Apache Security Team page.
Severity: Medium
Vendor: The Apache Software Foundation
Versions Affected:
Description: Apache Maven 3.0.4 (with Apache Maven Wagon 2.1) has introduced a non-secure SSL mode by default. This mode disables all SSL certificate checking, including: host name verification , date validity, and certificate chain. Not validating the certificate introduces the possibility of a man-in-the-middle attack.
All users are recommended to upgrade to Apache Maven 3.0.5 and Apache Maven Wagon 2.4.
Credit: This issue was identified by Graham Leggett
Severity: Medium
Vendor: The Apache Software Foundation
Versions Affected:
Description: http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject’s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field.
Users of this provider are recommended to upgrade to Apache Maven Wagon :: WebDAV Provider 3.0.0