Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-4492

Опубликовано: 23 фев. 2023
Источник: debian
EPSS Низкий

Описание

The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
undertowfixed2.3.8-1experimentalpackage
undertowfixed2.3.8-2package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2153260 has missing public details

  • Fixed by https://github.com/undertow-io/undertow/pull/1447

EPSS

Процентиль: 29%
0.00107
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.

CVSS3: 7.5
redhat
около 3 лет назад

The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.

CVSS3: 7.5
nvd
почти 3 года назад

The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.

CVSS3: 9.8
github
почти 3 года назад

Undertow client not checking server identity presented by server certificate in https connections

EPSS

Процентиль: 29%
0.00107
Низкий