CVE-2022-4492 — Server-Side Request Forgery in Redhat Undertow
Severity
7.5HIGHNVD
EPSS
0.2%
top 63.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 23
Latest updateOct 15
Description
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages7 packages
🔴Vulnerability Details
4CVEList▶
CVE-2022-4492: The undertow client is not checking the server identity presented by the server certificate in https connections↗2023-02-23
OSV▶
CVE-2022-4492: The undertow client is not checking the server identity presented by the server certificate in https connections↗2023-02-23
OSV▶
Undertow client not checking server identity presented by server certificate in https connections↗2023-02-23
GHSA▶
Undertow client not checking server identity presented by server certificate in https connections↗2023-02-23
📋Vendor Advisories
3Oracle
▶
Red Hat
▶
Debian▶
CVE-2022-4492: undertow - The undertow client is not checking the server identity presented by the server ...↗2022