HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0835 HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.
Github GHSA Github GHSA GHSA-hxp5-8pgq-mgv9 Missing Authentication for Critical Function in Apache Calcite
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00861}

epss

{'score': 0.00635}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T12:32:14.444Z

Reserved: 2020-06-08T00:00:00

Link: CVE-2020-13955

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-09T13:15:11.083

Modified: 2024-11-21T05:02:13.820

Link: CVE-2020-13955

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.