CVE-2022-24968

Source
https://cve.org/CVERecord?id=CVE-2022-24968
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24968.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-24968
Aliases
Published
2022-02-11T22:15:07.887Z
Modified
2026-03-13T22:50:40.015572Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.

References

Affected packages

Git / github.com/mellium/xmpp

Affected ranges

Type
GIT
Repo
https://github.com/mellium/xmpp
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.18.0"
        },
        {
            "fixed": "0.21.1"
        }
    ]
}

Affected versions

v0.*
v0.18.0
v0.19.0
v0.20.0
v0.21.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24968.json"