Description
The Uniffle HTTP client is configured to trust all SSL certificates and disables hostname verification by default. This insecure configuration exposes all REST API communication between the Uniffle CLI/client and the Uniffle Coordinator service to potential Man-in-the-Middle (MITM) attacks. This issue affects all versions from before 0.10.0. Users are recommended to upgrade to version 0.10.0, which fixes the issue.
Problem types
CWE-297 Improper Validation of Certificate with Host Mismatch
Product status
Any version before 0.10.0
Credits
omkar parkhe.
References
www.openwall.com/lists/oss-security/2025/12/27/2
lists.apache.org/thread/trvdd11hmpbjno3t8rc9okr4t036ox2v