| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09" |
| }, |
| "title": "Java Client Uses Connection to Host that Failed Hostname Verification", |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "description": "CWE-295 Improper Certificate Validation", |
| "lang": "en", |
| "cweId": "CWE-295", |
| "type": "CWE" |
| } |
| ] |
| } |
| ], |
| "source": { |
| "advisory": "https://github.com/apache/bookkeeper/pull/3310", |
| "discovery": "UNKNOWN" |
| }, |
| "affected": [ |
| { |
| "vendor": "Apache Software Foundation", |
| "product": "Apache BookKeeper", |
| "versions": [ |
| { |
| "status": "affected", |
| "version": "0", |
| "lessThanOrEqual": "4.14.5", |
| "versionType": "maven" |
| }, |
| { |
| "status": "affected", |
| "version": "4.15.0", |
| "versionType": "" |
| } |
| ], |
| "defaultStatus": "unaffected" |
| } |
| ], |
| "descriptions": [ |
| { |
| "value": "The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves\nthe bookkeeper client vulnerable to a man in the middle attack.\n\nThe problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1.", |
| "lang": "en", |
| "supportingMedia": [ |
| { |
| "type": "text/html", |
| "base64": false, |
| "value": "<span style=\"background-color: rgb(255, 255, 255);\">The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the</span><span style=\"background-color: rgb(255, 255, 255);\"> bookkeeper server when TLS hostname verification fails. This leaves</span><br><span style=\"background-color: rgb(255, 255, 255);\">the bookkeeper client vulnerable to a man in the middle attack.<br></span><br>The problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1." |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9", |
| "tags": [ |
| "vendor-advisory" |
| ] |
| } |
| ], |
| "metrics": [ |
| { |
| "other": { |
| "type": "Textual description of severity", |
| "content": { |
| "text": "Moderate" |
| } |
| } |
| } |
| ], |
| "solutions": [ |
| { |
| "lang": "en", |
| "value": "Upgrade to 4.14.6 or to 4.15.1\n", |
| "supportingMedia": [ |
| { |
| "type": "text/html", |
| "base64": false, |
| "value": "Upgrade to 4.14.6 or to 4.15.1<br>" |
| } |
| ] |
| } |
| ], |
| "x_generator": { |
| "engine": "Vulnogram 0.1.0-dev" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "cveId": "CVE-2022-32531", |
| "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", |
| "serial": 1, |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |