hugo/content/about/security/advisories/cve-2022-26491.md

Thu, 02 Jan 2025 16:35:59 -0600

author
Gary Kramlich <grim@reaperworld.com>
date
Thu, 02 Jan 2025 16:35:59 -0600
changeset 545
cf811d26020d
parent 488
bddb1b032e08
permissions
-rw-r--r--

Add a flathub verification token

Testing Done:
Ran with `npm run hugo:server` and verified the file was served properly.

Reviewed at https://reviews.imfreedom.org/r/3718/

---
title: cve-2022-26491-00
date: 2022-04-28T10:40:22+00:00
cveNumber: cve-2022-26491
summary: MITM when used without DNSSEC
discoveredBy: moparisthebest
fixedInRelease: 2.14.9
type: security
layout: cve
---

### Description

If not using DNSSEC it is trivial to perform a man in the middle attack a
client via DNS spoofing. You can find more discussion in the
[XMPP Standards Archives](https://mail.jabber.org/pipermail/standards/2022-February/038759.html).

### Mitigation

Removed the code that supported the `_xmppconnect` DNS TXT record.

mercurial