CVE-2022-24968

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24968
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24968.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-24968
Aliases
Withdrawn
2024-05-08T06:51:50.507733Z
Published
2022-02-11T22:15:07Z
Modified
2023-11-28T23:19:23.586376Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.

References

Affected packages

Git / github.com/mellium/xmpp

Affected ranges

Type
GIT
Repo
https://github.com/mellium/xmpp
Events

Affected versions

v0.*

v0.18.0
v0.19.0
v0.20.0
v0.21.0