Red Hat Bugzilla – Bug 1133769
CVE-2013-7397 async-http-client: SSL/TLS certificate verification is disabled under certain conditions
Last modified: 2018-08-18 07:30:38 EDT
It was found that async-http-client would disable SSL/TLS certificate verification under certain conditions, for example if HTTPS communication also uses client certificates. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can spoof a valid certificate.
Upstream bug: https://github.com/AsyncHttpClient/async-http-client/issues/352
This issue has been addressed in the following products: JBoss BPM Suite 6.1.0 Via RHSA-2015:0851 https://rhn.redhat.com/errata/RHSA-2015-0851.html
This issue has been addressed in the following products: JBoss BRMS 6.1.0 Via RHSA-2015:0850 https://rhn.redhat.com/errata/RHSA-2015-0850.html
async-http-client-1.7.22-2.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat JBoss Fuse 6.2.0 Via RHSA-2015:1176 https://rhn.redhat.com/errata/RHSA-2015-1176.html
This issue has been addressed in the following products: JBoss Fuse Service Works 6.0.0 Via RHSA-2015:1551 https://rhn.redhat.com/errata/RHSA-2015-1551.html