Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability: Man-in-the-Middle (MitM) #10806

Closed
superalb21234 opened this issue Nov 17, 2020 · 3 comments
Closed

Vulnerability: Man-in-the-Middle (MitM) #10806

superalb21234 opened this issue Nov 17, 2020 · 3 comments

Comments

@superalb21234
Copy link

Expected behavior

Actual behavior

netty-handler is vulnerable to man-in-the-middle attacks. The library uses an SSLEngine that does not verify certificate hostnames when establishing connections with clients by default. This allows an attacker to potentially intercept and modify network traffic in a successful man-in-the-middle attack.

Steps to reproduce

Minimal yet complete reproducer code (or URL to code)

Netty version

Latest version still has this vulnerability

JVM version (e.g. java -version)

OS version (e.g. uname -a)

@superalb21234
Copy link
Author

is there a possible future fix for this vulnerability issue?
FYI: using veracode platform to find some vulnerabilities in the application

@hyperxpro
Copy link
Contributor

Duplicate of #10362 #9930.

This issue will not be fixed in Netty 4.1.X. It's already scheduled for Netty 5.X in #8537.

@normanmaurer
Copy link
Member

Yes as stated we will change this in netty 5.

This was referenced May 17, 2021
This was referenced Dec 27, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants