The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.
History

Wed, 04 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Asynchttpclient Project
Asynchttpclient Project async-http-client
CPEs cpe:2.3:a:asynchttpclient_project:async-http-client:*:*:*:*:*:*:*:*
Vendors & Products Asynchttpclient Project
Asynchttpclient Project async-http-client
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


Mon, 02 Dec 2024 17:30:00 +0000

Type Values Removed Values Added
Description The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.
Title AsyncHttpClient (AHC) library's `CookieStore` replaces explicitly defined `Cookie`s
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-12-02T17:10:28.229Z

Updated: 2024-12-04T17:08:11.472Z

Reserved: 2024-11-25T23:14:36.381Z

Link: CVE-2024-53990

cve-icon Vulnrichment

Updated: 2024-12-04T17:08:07.802Z

cve-icon NVD

Status : Received

Published: 2024-12-02T18:15:11.753

Modified: 2024-12-02T18:15:11.753

Link: CVE-2024-53990

cve-icon Redhat

Severity : Important

Publid Date: 2024-12-02T17:10:28Z

Links: CVE-2024-53990 - Bugzilla