GHSA-m658-p24x-p74r

Suggest an improvement
Source
https://github.com/advisories/GHSA-m658-p24x-p74r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-m658-p24x-p74r/GHSA-m658-p24x-p74r.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-m658-p24x-p74r
Aliases
Withdrawn
2024-05-20T21:04:24Z
Published
2022-02-12T00:00:36Z
Modified
2024-05-20T21:04:24Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Duplicate Advisory: TLS certificate validation error in mellium.im/xmpp
Details

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-h289-x5wc-xcv8. This link is maintained to preserve external references.

Original Description

In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.

Database specific
{
    "nvd_published_at": "2022-02-11T22:15:00Z",
    "cwe_ids": [
        "CWE-295"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-02-14T22:38:04Z"
}
References

Affected packages

Go / mellium.im/xmpp

Package

Name
mellium.im/xmpp
View open source insights on deps.dev
Purl
pkg:golang/mellium.im/xmpp

Affected ranges

Type
SEMVER
Events
Introduced
0.18.0
Fixed
0.21.1