Safety vulnerability ID: 54056
The information on this page was manually curated by our Cybersecurity Intelligence Team.
httplib2 0.7.2, 0.8, and earlier, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Latest version: 0.22.0
A comprehensive HTTP client library.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application