In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade aws-lc-sys to version 0.39.0 or higher.
Affected versions of this package are vulnerable to Improper Certificate Validation in the cn2dnsid function during certificate validation. An attacker can bypass name constraints enforcement by presenting certificates with wildcard or raw UTF-8 Unicode Common Name values, which are not recognized as valid DNS identifiers, allowing unauthorized certificates to be accepted for hostname verification when no dNSName SAN is present.
Note: This is only exploitable if applications do not set X509_CHECK_FLAG_NEVER_CHECK_SUBJECT and encounter certificates without dNSName SANs.
This vulnerability can be mitigated by configuring applications to set X509_CHECK_FLAG_NEVER_CHECK_SUBJECT to disable CN fallback or by ensuring only certificates with dNSName SANs are accepted.