First published: Tue Aug 26 2014(Updated: )
It was found that async-http-client did not verify that the server hostname matched the domain name in the subject's Common Name (CN) or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/async-http-client | <1.9.0 | 1.9.0 |
Async-http-client Project Async-http-client | <=1.9.0 | |
Redhat Jboss Fuse | <=6.1.0 | |
maven/com.ning:async-http-client | <1.9.0 | 1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.