CVE-2013-7397

Source
https://nvd.nist.gov/vuln/detail/CVE-2013-7397
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2013-7397.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2013-7397
Aliases
Related
Published
2015-06-24T16:59:00Z
Modified
2025-01-06T17:00:22Z
Summary
[none]
Details

Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.

References

Affected packages

Debian:11 / async-http-client

Package

Name
async-http-client
Purl
pkg:deb/debian/async-http-client?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.5-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / async-http-client

Package

Name
async-http-client
Purl
pkg:deb/debian/async-http-client?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.5-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}