main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2559 main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.
Github GHSA Github GHSA GHSA-5c66-6h6g-6q6m Insufficient Verification of Data Authenticity in Async Http Client
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T18:09:16.513Z

Reserved: 2014-08-25T00:00:00

Link: CVE-2013-7398

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-06-24T16:59:01.280

Modified: 2025-04-12T10:46:40.837

Link: CVE-2013-7398

cve-icon Redhat

Severity : Important

Publid Date: 2013-01-09T00:00:00Z

Links: CVE-2013-7398 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses