First published: Thu Feb 16 2023(Updated: )
It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service.
Credit: cve-coordination@palantir.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palantir Sls-logging | <9.51.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48308 is a vulnerability in the sls-logging software that allows a malicious attacker to perform a man-in-the-middle attack by misusing the javax.net.ssl.SSLSocketFactory API.
CVE-2022-48308 has a severity keyword of medium and a severity value of 3.7.
CVE-2022-48308 affects Palantir Sls-logging version up to exclusive 9.51.0.
CVE-2022-48308 can be exploited by a malicious attacker in a privileged network position who can abuse the vulnerability to perform a man-in-the-middle attack.
You can find more information about CVE-2022-48308 in Palantir's security bulletin: https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-14.md