Description
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
Remediation
References
https://access.redhat.com/security/cve/CVE-2022-4492
https://bugzilla.redhat.com/show_bug.cgi?id=2153260
https://security.netapp.com/advisory/ntap-20230324-0002/
Related Vulnerabilities
CVE-2023-26136 Vulnerability in maven package org.webjars.bowergithub.salesforce:tough-cookie
CVE-2020-14359 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2020-2261 Vulnerability in maven package org.jenkins-ci.plugins:perfecto
CVE-2021-39234 Vulnerability in maven package org.apache.ozone:ozone-common
CVE-2019-11272 Vulnerability in maven package org.springframework.security:spring-security-core