In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1027 | In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification. |
Github GHSA |
GHSA-h289-x5wc-xcv8 | Improper Validation of Certificate with Host Mismatch in mellium.im/xmpp/websocket |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://mellium.im/cve/cve-2022-24968/ |
|
| https://mellium.im/xmpp/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T04:29:01.535Z
Reserved: 2022-02-11T00:00:00.000Z
Link: CVE-2022-24968
No data.
Status : Modified
Published: 2022-02-11T22:15:07.887
Modified: 2024-11-21T06:51:28.563
Link: CVE-2022-24968
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA