Description
The Java WebSocket client nv-websocket-client does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL/TLS servers via an arbitrary valid certificate.
Remediation
References
https://github.com/TakahikoKawasaki/nv-websocket-client/pull/107
Related Vulnerabilities
CVE-2022-45868 Vulnerability in maven package com.h2database:h2
CVE-2021-22132 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2022-21126 Vulnerability in maven package com.github.samtools:htsjdk
CVE-2022-28220 Vulnerability in maven package org.apache.james:james-server-protocols-managesieve
CVE-2015-7940 Vulnerability in maven package org.bouncycastle:bcprov-jdk15on