CVE-2021-36377
NixOS vulnerability analysis and mitigation

Overview

CVE-2021-36377 affects Fossil versions before 2.14.2 and 2.15.x before 2.15.2, where the software often skips the hostname check during TLS certificate validation. The vulnerability was discovered in June 2021 and disclosed through the Fossil developers' chatroom (Fossil Forum).

Technical details

The vulnerability is classified as CWE-295 (Improper Certificate Validation) with a CVSS v3.1 Base Score of 7.5 (HIGH). The technical issue involves the client-side TLS implementation failing to verify that the hostname of the server matched the hostname contained in the TLS certificate, allowing HTTPS connections to succeed with any valid certificate, regardless of hostname match (NVD).

Impact

When exploited, this vulnerability could allow an attacker to perform man-in-the-middle attacks since the TLS certificate validation process does not properly verify the hostname. This means that while connections are encrypted, they might not be connecting to the intended server, potentially exposing sensitive information to unauthorized parties (Fossil Forum).

Mitigation and workarounds

Users are recommended to upgrade to one of the following versions: Fossil version 2.15.2, version 2.14.2, or any build dated 2021-06-15 or later. The vulnerability has been patched on the trunk, 2.15, and 2.14 branches (Fossil Forum, Fedora Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management