ghsa-63qc-p2x4-9fgf
Vulnerability from github
Published
2019-09-17 22:47
Modified
2021-04-27 19:46
Severity ?
Summary
Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client library
Details
In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.eclipse.paho:org.eclipse.paho.client.mqttv3" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.2.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-11777" ], "database_specific": { "cwe_ids": [ "CWE-346", "CWE-755" ], "github_reviewed": true, "github_reviewed_at": "2019-09-13T21:47:04Z", "nvd_published_at": "2019-09-11T18:15:00Z", "severity": "MODERATE" }, "details": "In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information.", "id": "GHSA-63qc-p2x4-9fgf", "modified": "2021-04-27T19:46:40Z", "published": "2019-09-17T22:47:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11777" }, { "type": "WEB", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=549934" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client library" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.