Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsA fix was pushed into the master branch but not yet published.
Affected versions of this package are vulnerable to Improper Null Termination in Utility::generalNameAsString. An attacker can bypass certificate validation by presenting a certificate containing an embedded null byte in the OTHERNAME SAN value.
Notes:
require_client_certificate as true and a match_typed_subject_alt_names entry for the OTHERNAME OID with matcher.exact.