### [CVE-2014-3596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3596) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784. ### POC #### Reference - https://www.oracle.com/security-alerts/cpujan2020.html #### Github - https://github.com/eliasgranderubio/4depcheck - https://github.com/hinat0y/Dataset1 - https://github.com/hinat0y/Dataset10 - https://github.com/hinat0y/Dataset11 - https://github.com/hinat0y/Dataset12 - https://github.com/hinat0y/Dataset2 - https://github.com/hinat0y/Dataset3 - https://github.com/hinat0y/Dataset4 - https://github.com/hinat0y/Dataset5 - https://github.com/hinat0y/Dataset6 - https://github.com/hinat0y/Dataset7 - https://github.com/hinat0y/Dataset8 - https://github.com/hinat0y/Dataset9