Description
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
Remediation
References
Related Vulnerabilities
WordPress Plugin Easy FancyBox Cross-Site Scripting (1.8.17)
WordPress Plugin BP Profile Search PHP Object Injection (4.5.3)
Python CVE-2022-42919 Vulnerability (CVE-2022-42919)
WordPress Plugin Better Click To Tweet Unspecified Vulnerability (5.1)
WordPress Plugin Email Subscriber Cross-Site Scripting (1.1)