CVE Vulnerabilities

CVE-2013-7398

Insufficient Verification of Data Authenticity

Published: Jun 24, 2015 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
5.8 IMPORTANT
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

NameVendorStart VersionEnd Version
Async-http-clientAsync-http-client_project*1.9.0 (including)
Red Hat JBoss BPMS 6.0RedHatasync-http-client*
Red Hat JBoss BRMS 6.0RedHatasync-http-client*
Red Hat JBoss Fuse 6.2RedHat*
Red Hat JBoss Fuse Service Works 6.0RedHatasync-http-client*
Async-http-clientUbuntuartful*
Async-http-clientUbuntuprecise*
Async-http-clientUbuntuutopic*
Async-http-clientUbuntuvivid*
Async-http-clientUbuntuwily*
Async-http-clientUbuntuyakkety*
Async-http-clientUbuntuzesty*

References