Skip to content

Transifex command-line client has improper certificate validation

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated May 1, 2024

Package

pip transifex-client (pip)

Affected versions

< 0.10

Patched versions

0.10

Description

Transifex command-line client before 0.10 does not validate X.509 certificates for data transfer connections, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-2073.

References

Published by the National Vulnerability Database May 2, 2014
Published to the GitHub Advisory Database May 17, 2022
Reviewed May 1, 2024
Last updated May 1, 2024

Severity

Moderate

EPSS score

0.082%
(36th percentile)

Weaknesses

CVE ID

CVE-2013-7110

GHSA ID

GHSA-jf99-2rj4-jxrm
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.