CVE Vulnerabilities

CVE-2013-7397

Insufficient Verification of Data Authenticity

Published: Jun 24, 2015 | Modified: Nov 07, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
5.8 IMPORTANT
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM

Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

Name Vendor Start Version End Version
Jboss_fuse Redhat * 6.1.0 (including)
Red Hat JBoss BPMS 6.0 RedHat async-http-client *
Red Hat JBoss BRMS 6.0 RedHat async-http-client *
Red Hat JBoss Fuse 6.2 RedHat *
Red Hat JBoss Fuse Service Works 6.0 RedHat async-http-client *
Async-http-client Ubuntu precise *
Async-http-client Ubuntu trusty *
Async-http-client Ubuntu trusty/esm *
Async-http-client Ubuntu upstream *
Async-http-client Ubuntu utopic *
Async-http-client Ubuntu vivid *
Async-http-client Ubuntu wily *

References