Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h83p-72jv-g7vp

Опубликовано: 31 авг. 2024
Источник: github
Github: Прошло ревью
CVSS4: 4.8
CVSS3: 7.3

Описание

Missing hostname validation in Kroxylicious

A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server's hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.

Пакеты

Наименование

io.kroxylicious:kroxylicious-runtime

maven
Затронутые версииВерсия исправления

< 0.8.0

0.8.0

EPSS

Процентиль: 28%
0.00097
Низкий

4.8 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-295
CWE-297

Связанные уязвимости

CVSS3: 5.9
redhat
больше 1 года назад

A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server's hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.

CVSS3: 5.9
nvd
больше 1 года назад

A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server's hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.

EPSS

Процентиль: 28%
0.00097
Низкий

4.8 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-295
CWE-297