4.3
CVSSv2

CVE-2013-7397

Published: 24/06/2015 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Async Http Client (aka AHC or async-http-client) prior to 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle malicious users to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat jboss fuse

async-http-client project async-http-client

Vendor Advisories

It was found that async-http-client would disable SSL/TLS certificate verification under certain conditions, for example if HTTPS communication also used client certificates A man-in-the-middle (MITM) attacker could use this flaw to spoof a valid certificate ...