CVE-2022-4492
Summary
| CVE | CVE-2022-4492 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-02-23 20:15:00 UTC |
| Updated | 2023-03-24 16:15:00 UTC |
| Description | The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redhat | Build Of Quarkus | - | All | All | All |
| Application | Redhat | Integration Camel For Spring Boot | - | All | All | All |
| Application | Redhat | Integration Camel K | - | All | All | All |
| Application | Redhat | Integration Service Registry | - | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform | 7.0.0 | All | All | All |
| Application | Redhat | Jboss Fuse | 7.0.0 | All | All | All |
| Application | Redhat | Migration Toolkit For Applications | 6.0 | All | All | All |
| Application | Redhat | Migration Toolkit For Runtimes | - | All | All | All |
| Application | Redhat | Single Sign-on | 7.0 | All | All | All |
| Application | Redhat | Undertow | 2.7.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2022-4492 Undertow Vulnerability in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| 2153260 – (CVE-2022-4492) CVE-2022-4492 undertow: Server identity in https connection is not checked by the undertow client | MISC | bugzilla.redhat.com | |
| Red Hat Customer Portal - Access to 24x7 support and knowledge | MISC | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.