hc-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Volker Kleinschmidt (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (HTTPCLIENT-1256) HttpClient permits man in the middle attacks when using HTTPS
Date Tue, 17 Nov 2015 19:45:11 GMT

    [ https://issues.apache.org/jira/browse/HTTPCLIENT-1256?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15009359#comment-15009359
] 

Volker Kleinschmidt commented on HTTPCLIENT-1256:
-------------------------------------------------

Unfortunately, version 4.2 wasn't really safe either, see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577
and http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6153

> HttpClient permits man in the middle attacks when using HTTPS
> -------------------------------------------------------------
>
>                 Key: HTTPCLIENT-1256
>                 URL: https://issues.apache.org/jira/browse/HTTPCLIENT-1256
>             Project: HttpComponents HttpClient
>          Issue Type: Bug
>          Components: HttpClient
>    Affects Versions: 3.1 (end of life)
>            Reporter: Robert Elliot
>            Priority: Critical
>
> As documented here:http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf HttpClient 3.1 does
not use JSSE correctly - specifically, a request over HTTPS does not validate that the returned
certificate is actually for the domain originally requested. This means a man in the middle
attack via DNS poisoning will work.
> I have proven this locally by setting a /etc/hosts entry for www.google.com to the IP
address of github.com. When I then run the following code:
> HttpClient client = new HttpClient();
> GetMethod get = new GetMethod("https://www.google.com");
> client.executeMethod(get);
> System.out.println(get.getResponseBodyAsString());
> I am returned the contents of the github.com page. I should have had an exception warning
me that the certificate was not valid for www.google.com.
> Whilst I appreciate that 3.x is not under development, given the large number of applications
and libraries (such as Axis 1 & 2) that depend on version 3 it would seem responsible
to fix this vulnerability.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@hc.apache.org
For additional commands, e-mail: dev-help@hc.apache.org


Mime
View raw message