Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h289-x5wc-xcv8

Опубликовано: 16 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Improper Validation of Certificate with Host Mismatch in mellium.im/xmpp/websocket

Impact

If no TLS configuration is provided by the user, the websocket package constructs its own TLS configuration using recommended defaults. When looking up a WSS endpoint using the DNS TXT record method described in XEP-0156: Discovering Alternative XMPP Connection Methods the ServerName field was incorrectly being set to the name of the server returned by the TXT record request, not the name of the initial server we were attempting to connect to. This means that any attacker that can spoof a DNS record (ie. in the absence of DNSSEC, DNS-over-TLS, DNS-over-HTTPS, or similar technologies) could redirect the user to a server of their choosing and as long as it had a valid TLS certificate for itself the connection would succeed, resulting in a MITM situation.

Patches

All users should upgrade to v0.21.1.

Workarounds

To work around the issue, manually specify a TLS configuration with the correct hostname.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

mellium.im/xmpp

go
Затронутые версииВерсия исправления

>= 0.18.0, < 0.21.1

0.21.1

EPSS

Процентиль: 40%
0.00182
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-295

Связанные уязвимости

CVSS3: 5.9
nvd
почти 4 года назад

In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.

EPSS

Процентиль: 40%
0.00182
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-295