DEBIAN-CVE-2013-7397

Source
https://security-tracker.debian.org/tracker/CVE-2013-7397
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2013-7397.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2013-7397
Upstream
Published
2015-06-24T16:59:00Z
Modified
2025-09-25T00:36:59.309905Z
Summary
[none]
Details

Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.

References

Affected packages

Debian:11 / async-http-client

Package

Name
async-http-client
Purl
pkg:deb/debian/async-http-client?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.5-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / async-http-client

Package

Name
async-http-client
Purl
pkg:deb/debian/async-http-client?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.5-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}