Magritte-ftp TLS Certificate Hostname Verification Bypass Vulnerability

Magritte-ftp TLS Certificate Hostname Verification Bypass Vulnerability

CVE-2022-48307 · LOW Severity

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

It was discovered that the Magritte-ftp was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of a successful man in the middle attack on magritte-ftp, an attacker would be able to read and modify network traffic such as authentication tokens or raw data entering a Palantir Foundry stack.

Learn more about our Cis Benchmark Audit For Suse Linux Enterprise Server.