漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of AtlasDB, the vulnerability was mitigated by other network controls such as two-way TLS when deployed as part of a Palantir platform. Palantir still recommends upgrading to a non-vulnerable version out of an abundance of caution.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N
Vulnerability Type
对宿主不匹配的证书验证不恰当
Vulnerability Title
Palantir 信任管理问题漏洞
Vulnerability Description
Palantir是美国Palantir公司的一个数据平台,通过消除后端数据管理和前端数据分析之间的障碍来重新构想人们如何使用数据。 Palantir 0.730.0之前版本存在安全漏洞,该漏洞源于Gotham Chat IRC Helper滥用 javax.net.ssl.SSLSocketFactory API 而未验证 TLS 证书中的主机名,攻击者利用该漏洞可以执行中间人攻击,成功的中间人攻击将允许他们拦截、读取或修改进出受影响服务的网络通信。
CVSS Information
N/A
Vulnerability Type
N/A