The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability announce CVE-2011-4968

nginx: certificate not checked in mode Proxy SSL

Synthesis of the vulnerability

When nginx is configured in mode Proxy SSL, the server identity is not checked, so an attacker can setup a Man-in-the-Middle attack.
Impacted products: nginx.
Severity: 2/4.
Creation date: 04/01/2013.
Identifiers: BID-57139, CVE-2011-4968, VIGILANCE-VUL-12282.

Description of the vulnerability

The nginx can be configured in mode Proxy SSL. In this case, it connects to a web server with SSL/TLS enabled.

However, nginx does not check the validity of the X.509 certificate offered by the web server.

When nginx is configured in mode Proxy SSL, an attacker can therefore setup a Man-in-the-Middle attack.
Complete Vigil@nce bulletin.... (free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computers vulnerabilities workaround. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system. The Vigil@nce vulnerability database contains several thousand vulnerabilities.