Insufficient Verification of Data Authenticity in Async Http Client
Moderate severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Mar 4, 2024
Description
Published by the National Vulnerability Database
Jun 24, 2015
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jul 7, 2022
Last updated
Mar 4, 2024
Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.
References