main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.

Project Subscriptions

Vendors Products
Async-http-client Project Subscribe
Async-http-client Subscribe
Jboss Bpms Subscribe
Jboss Brms Subscribe
Jboss Fuse Subscribe
Jboss Fuse Service Works Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2559 main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.
Github GHSA Github GHSA GHSA-5c66-6h6g-6q6m Insufficient Verification of Data Authenticity in Async Http Client
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T18:09:16.513Z

Reserved: 2014-08-25T00:00:00

Link: CVE-2013-7398

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-06-24T16:59:01.280

Modified: 2025-04-12T10:46:40.837

Link: CVE-2013-7398

cve-icon Redhat

Severity : Important

Publid Date: 2013-01-09T00:00:00Z

Links: CVE-2013-7398 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses