You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hardcoding the rejectUnauthorized option in lib/transport/websocket.js to false exposes autobahn-js clients to man-in-the-middle attacks, as server certificates are never verified against the list of supplied certificate authorities.
In production environments, the rejectUnauthorized option must always default to true, not false. This option is passed through to https.request in Node.js and overwrites its default value which is true.
If you are using a self-signed server certificate in development or test environments, you should be able to pass the rejectUnauthorized: false option.
Fix:
Extend tlsConfiguration options by an optional rejectUnauthorized option.
If this option is not specified, pass rejectUnauthorized: true.
Hardcoding the
rejectUnauthorized
option inlib/transport/websocket.js
tofalse
exposes autobahn-js clients to man-in-the-middle attacks, as server certificates are never verified against the list of supplied certificate authorities.In production environments, the
rejectUnauthorized
option must always default totrue
, notfalse
. This option is passed through tohttps.request
in Node.js and overwrites its default value which istrue
.If you are using a self-signed server certificate in development or test environments, you should be able to pass the
rejectUnauthorized: false
option.Fix:
tlsConfiguration
options by an optionalrejectUnauthorized
option.rejectUnauthorized: true
.false
.Thanks for providing a patch release fixing this issue!
Hubertus
The text was updated successfully, but these errors were encountered: