CVE-2020-9040
08.06.2020, 16:15
Couchbase Server Java SDK before 2.7.1.1 allows a potential attacker to forge an SSL certificate and pose as the intended peer. An attacker can leverage this flaw by crafting a cryptographically valid certificate that will be accepted by Java SDK's Netty component due to missing hostname verification.Enginsight
Vendor | Product | Version |
---|---|---|
couchbase | couchbase_server_java_sdk | 1.7.1 ≤ 𝑥 < 2.7.1.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration