Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509
certificate verification unless both a keyStore location and a trustStore
location are explicitly set, which allows man-in-the-middle attackers to
spoof HTTPS servers by presenting an arbitrary certificate during use of a
typical AHC configuration, as demonstrated by a configuration that does not
send client certificates.
It was discovered that AsyncHttpClient did not properly validate SSL/TLS
certificates. An attacker could use this vulnerability to execute a
man-in-the-middle attack.
Upstream:released (1.6.5-3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 19.04 (Disco Dingo):not-affected
Ubuntu 19.10 (Eoan):not-affected
More Information

Updated: 2019-09-19 14:16:32 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)