IBM Support

SSL Certificate Validation fix for Man-In-The-Middle problem(WebSphere Application Server Community Edition 3.0.0.x)

Technote (troubleshooting)


There is a patch from the Axis community for SSL Certificate Validation issue(Man-In-The-Middle attack). The issue's CVE number is CVE-2012-5785.


Apache Axis2/Java 1.6.2 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name(CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate

Resolving the problem

To fix this issue, please follow the instruction.

1. Download the patch.SSLCertificateValidation(3.0.0.x).zipSSLCertificateValidation(3.0.0.x).zip

2. Unzip the attached file into the WebSphere Application Server Community Edition installation directory, and ensure the files listed in the zip file to replace the ones in the server installation directory.

3. Start the server with the cache cleaned, for example,

<WAS_CE_HOME>\bin\startup.bat -c

<WAS_CE_HOME>/bin/ -c

Document information

More support for: WebSphere Application Server Community Edition

Software version:,,

Operating system(s): AIX, Linux, Solaris, Windows

Software edition: Elite, Enhanced, Entry

Reference #: 1618212

Modified date: 19 November 2014

Translate this page: