CVE Vulnerabilities

CVE-2013-7397

Insufficient Verification of Data Authenticity

Published: Jun 24, 2015 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
5.8 IMPORTANT
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

NameVendorStart VersionEnd Version
Jboss_fuseRedhat*6.1.0 (including)
Red Hat JBoss BPMS 6.0RedHatasync-http-client*
Red Hat JBoss BRMS 6.0RedHatasync-http-client*
Red Hat JBoss Fuse 6.2RedHat*
Red Hat JBoss Fuse Service Works 6.0RedHatasync-http-client*
Async-http-clientUbuntuesm-infra-legacy/trusty*
Async-http-clientUbuntuprecise*
Async-http-clientUbuntutrusty*
Async-http-clientUbuntutrusty/esm*
Async-http-clientUbuntuupstream*
Async-http-clientUbuntuutopic*
Async-http-clientUbuntuvivid*
Async-http-clientUbuntuwily*

References