org.apache.httpcomponents:httpclient@4.0-alpha2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.httpcomponents:httpclient package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Improper Input Validation

org.apache.httpcomponents:httpclient is a HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Improper Input Validation. Apache HttpClient can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.

How to fix Improper Input Validation?

Upgrade org.apache.httpcomponents:httpclient to version 4.5.13 or higher.

[,4.5.13)
  • M
Directory Traversal

org.apache.httpcomponents:httpclient is a HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Directory Traversal. String input by user is not validated for the presence of leading character / and is passed to the constructor as path information, resulting in a Directory Traversal vulnerability.

How to fix Directory Traversal?

Upgrade org.apache.httpcomponents:httpclient to version 4.5.3 or higher.

[,4.5.3)
  • M
Information Exposure

org.apache.httpcomponents:httpclient Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used with an authenticating proxy server, sends the Proxy-Authorization header to the origin server, which allows remote web servers to obtain sensitive information by logging this header.

[4.0.alpha1,4.1)
  • M
Man-in-the-Middle (MitM)

org.apache.httpcomponents:httpclient is an HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM) due to not verify the requesting server's hostname against existing domain names in the SSL Certificate.

The AbstractVerifier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

How to fix Man-in-the-Middle (MitM)?

Upgrade org.apache.httpcomponents:httpclient to version 4.3.4 or higher.

[4.0-alpha1,4.3.4)