org.apache.httpcomponents:httpclient@4.3-beta2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.httpcomponents:httpclient package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Improper Input Validation

org.apache.httpcomponents:httpclient is a HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Improper Input Validation. Apache HttpClient can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.

How to fix Improper Input Validation?

Upgrade org.apache.httpcomponents:httpclient to version 4.5.13 or higher.

[,4.5.13)
  • M
Directory Traversal

org.apache.httpcomponents:httpclient is a HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Directory Traversal. String input by user is not validated for the presence of leading character / and is passed to the constructor as path information, resulting in a Directory Traversal vulnerability.

How to fix Directory Traversal?

Upgrade org.apache.httpcomponents:httpclient to version 4.5.3 or higher.

[,4.5.3)
  • M
Denial of Service (DoS)

org.apache.httpcomponents:httpclient is a HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Denial of Service (DoS) via the http/conn/ssl/SSLConnectionSocketFactory.java class. It ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.

How to fix Denial of Service (DoS)?

Upgrade org.apache.httpcomponents:httpclient to version 4.3.6 or higher.

[4.3-alpha1,4.3.6)
  • M
Man-in-the-Middle (MitM)

org.apache.httpcomponents:httpclient is an HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM) due to not verify the requesting server's hostname against existing domain names in the SSL Certificate.

The AbstractVerifier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

How to fix Man-in-the-Middle (MitM)?

Upgrade org.apache.httpcomponents:httpclient to version 4.3.4 or higher.

[4.0-alpha1,4.3.4)