Improper Certificate Validation in openssl
        
  High severity
        
          GitHub Reviewed
      
        Published
          Aug 25, 2021 
          to the GitHub Advisory Database
          •
          Updated Jun 13, 2023 
      
  
Description
        Published by the National Vulnerability Database
      Aug 26, 2019 
    
  
        Reviewed
      Aug 19, 2021 
    
  
        Published to the GitHub Advisory Database
      Aug 25, 2021 
    
  
        Last updated
      Jun 13, 2023 
    
  
All versions of rust-openssl prior to 0.9.0 contained numerous insecure defaults including off-by-default certificate verification and no API to perform hostname verification. Unless configured correctly by a developer, these defaults could allow an attacker to perform man-in-the-middle attacks. The problem was addressed in newer versions by enabling certificate verification by default and exposing APIs to perform hostname verification. Use the SslConnector and SslAcceptor types to take advantage of these new features (as opposed to the lower-level SslContext type).
References