CVE-2022-32531
MEDIUM
5,9
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: none
Description
AI Translation Available
The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves
the bookkeeper client vulnerable to a man in the middle attack.
The problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0080
Percentile
0,7th
Updated
EPSS Score Trend (Last 91 Days)
295
Improper Certificate Validation
DraftCommon Consequences
Security Scopes Affected:
Integrity
Authentication
Potential Impacts:
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Applicable Platforms
Technologies:
Mobile, Not Technology-Specific, Web Based
Application
Bookkeeper by Apache
Version Range Affected
To
4.14.6
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:apache:bookkeeper:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Bookkeeper by Apache
CPE Identifier
View Detailed Analysis
cpe:2.3:a:apache:bookkeeper:4.15.0:rc0:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Bookkeeper by Apache
CPE Identifier
View Detailed Analysis
cpe:2.3:a:apache:bookkeeper:4.15.0:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9
https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9