mod_pagespeed and ngx_pagespeed Security Advisory: SSL fetching man-in-the-middle attack.

Disclosed:

June 17th, 2014

Versions Affected:
  • mod_pagespeed 1.7.30.1 through 1.7.30.4 (fixed in 1.7.30.5)
  • mod_pagespeed and ngx_pagespeed 1.8.31.1 through 1.8.31.3 (fixed in 1.8.31.4)
Summary:

Some versions of mod_pagespeed and ngx_pagespeed, in order to support fetching of HTTPS content, link in versions of OpenSSL that are vulnerable to a man-in-the-middle attack. This attack permits an adversary that can monitor and alter traffic between a client (mod_pagespeed or ngx_pagespeed in this case) and a server to decrypt and modify encrypted transfers, as long as both are running vulnerable versions (see CVE-2014-0224 for more detail).

mod_pagespeed and ngx_pagespeed users are only vulnerable if they turn on the optional FetchHttps feature.

Solution:

For mod_pagespeed, update to one of versions 1.7.30.5-stable, 1.8.31.4-beta or newer.

For ngx_pagespeed, update to 1.8.31.4-beta or newer.

Workaround:

Use a method other than FetchHttps to fetch https content, as described in HTTP Support documentation.