Skip to content

Commit 250ef70

Browse files
Merge pull request #31 from RUB-NDS/masterpublic
Masterpublic
2 parents 0aadaff + 145f3df commit 250ef70

File tree

4 files changed

+13
-4
lines changed

4 files changed

+13
-4
lines changed

pom.xml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,11 @@
3838
<version>2.10.0</version>
3939
<type>jar</type>
4040
</dependency>
41+
<dependency>
42+
<groupId>com.fasterxml.jackson.core</groupId>
43+
<artifactId>jackson-core</artifactId>
44+
<version>2.10.0</version>
45+
</dependency>
4146
<dependency>
4247
<groupId>com.fasterxml.jackson.dataformat</groupId>
4348
<artifactId>jackson-dataformat-yaml</artifactId>
@@ -131,6 +136,7 @@
131136
<plugin>
132137
<groupId>com.mycila</groupId>
133138
<artifactId>license-maven-plugin</artifactId>
139+
<version>3.0</version>
134140
<configuration>
135141
<header>${basedir}/license_header_plain.txt</header>
136142
<strictCheck>true</strictCheck>

src/main/java/de/rub/nds/tlsscanner/probe/certificate/CertificateChain.java

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -202,8 +202,10 @@ public CertificateChain(Certificate certificate, String uri) {
202202
generallyTrusted = certPathValidationResult.isValid();
203203
if (!generallyTrusted) {
204204
CertPathValidationException[] causes = certPathValidationResult.getCauses();
205-
for (CertPathValidationException exception : causes) {
206-
exception.printStackTrace();
205+
if (causes != null) {
206+
for (CertPathValidationException exception : causes) {
207+
exception.printStackTrace();
208+
}
207209
}
208210
}
209211
} else {

src/main/java/de/rub/nds/tlsscanner/probe/padding/PaddingOracleAttributor.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -384,7 +384,7 @@ private List<KnownPaddingOracleVulnerability> createCve20196485() {
384384
+ "not directly allow an attacker to obtain the TLS private key.\n "
385385
+ "\n "
386386
+ "More Details: https://support.citrix.com/article/CTX240139";
387-
knownVulnList.add(new KnownPaddingOracleVulnerability("CVE-2019-6485", "Citrix CVE-2019-6485", "Citrix Netscalar CVE-2019-6485",
387+
knownVulnList.add(new KnownPaddingOracleVulnerability("CVE-2019-6485", "Citrix CVE-2019-6485", "Citrix NetScaler CVE-2019-6485",
388388
PaddingOracleStrength.POODLE, true, knownVulnableSuites, knownNotVulnableSuites, description,
389389
affectedProducts, responseList, false));
390390

src/main/java/de/rub/nds/tlsscanner/trust/TrustAnchorManager.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@
3030
import java.util.LinkedList;
3131
import java.util.List;
3232
import java.util.Set;
33+
import java.util.TreeSet;
3334
import javax.security.auth.x500.X500Principal;
3435
import org.apache.logging.log4j.LogManager;
3536
import org.apache.logging.log4j.Logger;
@@ -135,7 +136,7 @@ private Set<TrustAnchor> getFullTrustAnchorSet() {
135136
} catch (IOException | NoSuchAlgorithmException | CertificateException | KeyStoreException | InvalidAlgorithmParameterException ex) {
136137
LOGGER.error("Could not build TrustAnchorSet", ex);
137138
}
138-
return null;
139+
return new HashSet<>();
139140
}
140141

141142
public Set<TrustAnchor> getTrustAnchorSet() {

0 commit comments

Comments
 (0)