Description
Couchbase Server Java SDK before 2.7.1.1 allows a potential attacker to forge an SSL certificate and pose as the intended peer. An attacker can leverage this flaw by crafting a cryptographically valid certificate that will be accepted by Java SDK's Netty component due to missing hostname verification.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29869 | Couchbase Server Java SDK before 2.7.1.1 allows a potential attacker to forge an SSL certificate and pose as the intended peer. An attacker can leverage this flaw by crafting a cryptographically valid certificate that will be accepted by Java SDK's Netty component due to missing hostname verification. |
References
| Link | Providers |
|---|---|
| https://www.couchbase.com/resources/security#SecurityAlerts |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:19:19.882Z
Reserved: 2020-02-17T00:00:00.000Z
Link: CVE-2020-9040
No data.
Status : Modified
Published: 2020-06-08T16:15:10.273
Modified: 2024-11-21T05:39:52.887
Link: CVE-2020-9040
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD