oss-sec mailing list archives

Re: Lack of TLS certification chain validation in ZAP Proxy


From: Gabriel Corona <gabriel.corona () enst-bretagne fr>
Date: Thu, 24 Mar 2022 07:46:31 +0100

On 23/03/2022 22:02, Gabriel Corona wrote:
ZAP proxy does not verify the certificate chain of the HTTPS servers it connects to. For example, it connects without warning to servers presenting a self-signed certificate, an expired certificate, etc.

This opens up a browser configured to use ZAP as an intercepting proxy to:

1. man-in-the-middle (MITM) attacks;
2. DNS rebinding attacks (to HTTPS servers configured as default virtual server).


This is CVE-2022-27820.

Regards,

Gabriel Corona


Current thread: