cve/2022/CVE-2022-4492.md

20 lines
815 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-4492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4492)
![](https://img.shields.io/static/v1?label=Product&message=undertow&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=ssrf&color=brighgreen)
### Description
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/muneebaashiq/MBProjects
- https://github.com/srchen1987/springcloud-distributed-transaction