[MAVEN:GHSA-2CPX-6PQP-WF35] fs2-io skips mTLS client verification

Severity Critical
Affected Packages 1
Fixed Packages 1
CVEs 1

Impact

When establishing a server-mode TLSSocket using fs2-io on Node.js, the parameter requestCert = true is ignored, peer certificate verification is skipped, and the connection proceeds.

The vulnerability is limited to:
1. fs2-io running on Node.js. The JVM TLS implementation is completely independent.
2. TLSSockets in server-mode. Client-mode TLSSockets are implemented via a different API.
3. mTLS as enabled via requestCert = true in TLSParameters. The default setting is false for server-mode TLSSockets.

It was introduced with the initial Node.js implementation of fs2-io in v3.1.0.

Patches

A patch is released in v3.2.11. The requestCert = true parameter is respected and the peer certificate is verified. If verification fails, a SSLException is raised.

Workarounds

If using an unpatched version on Node.js, do not use a server-mode TLSSocket with requestCert = true to establish a mTLS connection.

References

For more information

If you have any questions or comments about this advisory:
* Open an issue.
* Contact the Typelevel Security Team.

Package Affected Version
pkg:maven/co.fs2/fs2-io >= 3.1.0, < 3.2.11
Package Fixed Version
pkg:maven/co.fs2/fs2-io = 3.2.11
ID
MAVEN:GHSA-2CPX-6PQP-WF35
Severity
critical
URL
https://github.com/advisories/GHSA-2cpx-6pqp-wf35
Published
2022-07-29T22:24:10
(2 years ago)
Modified
2023-01-31T05:01:19
(19 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/co.fs2/fs2-io co.fs2 fs2-io >= 3.1.0 < 3.2.11
Fixed pkg:maven/co.fs2/fs2-io co.fs2 fs2-io = 3.2.11
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...