CVE-2022-4492: Undertow client not checking server identity presented by server certificate in https connections
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.32566%
CWE
Published
2/23/2023
Updated
3/12/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.undertow:undertow-core | maven | >= 2.3.0, < 2.3.5.Final | 2.3.5.Final |
| io.undertow:undertow-core | maven | < 2.2.24.Final | 2.2.24.Final |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing hostname verification in HTTPS connections. The patches (GHSA-pfcc-3g6r-8rg8) explicitly add 'ENDPOINT_IDENTIFICATION_ALGORITHM=HTTPS' to client connection configurations. The vulnerable versions lacked this enforcement in HTTP/1.1 and HTTP/2 client providers, and in the SSL engine setup. The commit diffs show these functions were modified to add the missing validation, confirming they were the root cause.