Lucene search

K
githubGitHub Advisory DatabaseGHSA-4H8F-2WVX-GG5W
HistoryMay 03, 2024 - 6:30 p.m.

Bouncy Castle Java Cryptography API vulnerable to DNS poisoning

2024-05-0318:30:37
GitHub Advisory Database
github.com
24
bouncy castle
java cryptography
dns poisoning

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

An issue was discovered in Bouncy Castle Java Cryptography APIs before BC 1.78. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

Affected configurations

Vulners
Node
org.bouncycastle\bcprovMatchjdk12
OR
org.bouncycastle\bcprovMatchjdk13
OR
org.bouncycastle\bcprovMatchjdk14
OR
org.bouncycastle\bcprovMatchjdk15to18
OR
org.bouncycastle\bcprovMatchjdk18on

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%