Description
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
Remediation
References
https://access.redhat.com/security/cve/CVE-2022-4492
https://bugzilla.redhat.com/show_bug.cgi?id=2153260
https://security.netapp.com/advisory/ntap-20230324-0002/
Related Vulnerabilities
CVE-2016-4986 Vulnerability in maven package org.tap4j:tap
CVE-2019-25027 Vulnerability in maven package com.vaadin:flow-server
CVE-2020-13932 Vulnerability in maven package org.apache.activemq:artemis-plugin
CVE-2020-2121 Vulnerability in maven package org.jenkins-ci.plugins:google-kubernetes-engine
CVE-2019-16563 Vulnerability in maven package tech.andrey.jenkins:mission-control-view