When establishing a server-mode TLSSocket
using fs2-io
on Node.js, the parameter requestCert = true
is ignored, peer certificate verification is skipped, and the connection proceeds.
The vulnerability is limited to:
1. fs2-io
running on Node.js. The JVM TLS implementation is completely independent.
2. TLSSocket
s in server-mode. Client-mode TLSSocket
s are implemented via a different API.
3. mTLS as enabled via requestCert = true
in TLSParameters
. The default setting is false
for server-mode TLSSocket
s.
It was introduced with the initial Node.js implementation of fs2-io in v3.1.0.
A patch is released in v3.2.11. The requestCert = true
parameter is respected and the peer certificate is verified. If verification fails, a SSLException
is raised.
If using an unpatched version on Node.js, do not use a server-mode TLSSocket
with requestCert = true
to establish a mTLS connection.
If you have any questions or comments about this advisory: * Open an issue. * Contact the Typelevel Security Team.
{ "nvd_published_at": "2022-08-01T20:15:00Z", "github_reviewed_at": "2022-07-29T22:24:10Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-295" ] }