Man-in-the-Middle (MitM) Affecting org.apache.calcite:calcite-core package, versions [, 1.26)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHECALCITE-1038296
  • published9 Oct 2020
  • disclosed9 Oct 2020
  • creditUnknown

Introduced: 9 Oct 2020

CVE-2020-13955  (opens in a new tab)
CWE-300  (opens in a new tab)

How to fix?

Upgrade org.apache.calcite:calcite-core to version 1.26 or higher.

Overview

org.apache.calcite:calcite-core is a Core Calcite APIs and engine.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). The HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters.

The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications.

CVSS Scores

version 3.1