GO-2022-0947

Source
https://pkg.go.dev/vuln/GO-2022-0947
Import Source
https://vuln.go.dev/ID/GO-2022-0947.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2022-0947
Withdrawn
2024-05-15T05:37:10.715008Z
Published
2022-08-22T17:20:29Z
Modified
2022-08-29T16:50:59Z
Summary
[none]
Details

In Mellium mellium.im/xmpp, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during verification.

References

Affected packages

Go / mellium.im/xmpp

Package

Name
mellium.im/xmpp
View open source insights on deps.dev
Purl
pkg:golang/mellium.im/xmpp

Affected ranges

Type
SEMVER
Events
Introduced
0.18.0
Fixed
0.21.1

Ecosystem specific

{
    "imports": [
        {
            "path": "mellium.im/xmpp/websocket",
            "symbols": [
                "Dial",
                "DialDirect",
                "DialSession",
                "Dialer.Dial",
                "Dialer.DialDirect",
                "Dialer.config",
                "NewClient"
            ]
        }
    ]
}

Database specific

source
"https://vuln.go.dev/ID/GO-2022-0947.json"
url
"https://pkg.go.dev/vuln/GO-2022-0947"