CVE-2013-7397

Priority
Description
Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509
certificate verification unless both a keyStore location and a trustStore
location are explicitly set, which allows man-in-the-middle attackers to
spoof HTTPS servers by presenting an arbitrary certificate during use of a
typical AHC configuration, as demonstrated by a configuration that does not
send client certificates.
Package
Upstream:released (1.6.5-3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected
Ubuntu 19.04 (Disco Dingo):not-affected
Ubuntu 19.10 (Eoan):not-affected
More Information

Updated: 2019-05-15 17:14:30 UTC (commit 2d71aefac924bf16479c12958688c37878e881eb)