First published: Tue Aug 26 2014(Updated: )
Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/async-http-client | <1.9.0 | 1.9.0 |
Redhat Jboss Fuse | <=6.1.0 | |
Async-http-client Project Async-http-client | <=1.9.0 | |
maven/com.ning:async-http-client | <1.9.0 | 1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.