Description
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
Remediation
References
https://access.redhat.com/security/cve/CVE-2022-4492
https://bugzilla.redhat.com/show_bug.cgi?id=2153260
https://security.netapp.com/advisory/ntap-20230324-0002/
Related Vulnerabilities
CVE-2018-1000665 Vulnerability in maven package org.webjars.npm:dojo
CVE-2023-35155 Vulnerability in maven package org.xwiki.platform:xwiki-platform-sharepage-api
CVE-2021-21605 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-42767 Vulnerability in maven package org.neo4j.procedure:apoc
CVE-2022-45397 Vulnerability in maven package org.jenkins-ci.plugins:osf-builder-suite-xml-linter