CVE-2022-24968
NixOS vulnerability analysis and mitigation

Overview

In Mellium mellium.im/xmpp through 0.21.0, a vulnerability was discovered in the websocket package that could allow an attacker capable of spoofing DNS TXT records to redirect WebSocket connection requests. The vulnerability was assigned CVE-2022-24968 and was discovered in February 2022, affecting versions from 0.18.0 through 0.21.0. The issue was fixed in version 0.21.1 (Mellium Advisory, NVD).

Technical details

The vulnerability occurs in the TLS configuration of the websocket package. When looking up a WSS endpoint using DNS TXT record method (as described in XEP-0156: Discovering Alternative XMPP Connection Methods), the ServerName field was incorrectly set to the name of the server returned by the TXT record request, instead of the initial server being connected to. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.9 (Medium) with vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N (NVD).

Impact

A successful exploitation of this vulnerability could allow an attacker to redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This could result in a man-in-the-middle (MITM) situation where the attacker could intercept and potentially manipulate XMPP communications (Mellium Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 0.21.1 of mellium.im/xmpp. Users are advised to upgrade to this version or later to address the security issue. The fix ensures proper verification of the server name during TLS certificate validation (Mellium Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management