SSL Certificate Validation fix for Man-In-The-Middle problem(WebSphere Application Server Community Edition 220.127.116.11)
There is a patch from the Axis community for SSL Certificate Validation issue(Man-In-The-Middle attack). The issue's CVE number is CVE-2012-5785.
Apache Axis2/Java 1.6.2 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name(CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Resolving the problem
To fix this issue, please follow the instruction.
1. Download the patch.SSLCertificateValidation(18.104.22.168).zip
2. Unzip the attached file into the WebSphere Application Server Community Edition installation directory, and ensure the files listed in the zip file to replace the ones in the server installation directory.
3. Start the server, for example,
More support for:
WebSphere Application Server Community Edition
Software version: 22.214.171.124
Operating system(s): AIX, Linux, Solaris, Windows
Software edition: Elite, Enhanced, Entry
Reference #: 1621009
Modified date: 20 December 2012