Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mfj5-cf8g-g2fv

Опубликовано: 02 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 9.2

Описание

AsyncHttpClient (AHC) library's CookieStore replaces explicitly defined Cookies

Summary

When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.

Details

This issue is described without security warnings here:

https://github.com/AsyncHttpClient/async-http-client/issues/1964

A PR to fix this issue has been made:

https://github.com/AsyncHttpClient/async-http-client/pull/2033

PoC

  1. Add an auth Cookie to the CookieStore
    • This is identical to receiving an HTTP response that uses Set-Cookie, as shown in issue #1964 above.
  2. Handle a different user's request where the same Cookie is provided as a passthrough, like a JWT, and attempt to use it by explicitly providing it.
  3. Observe that the user's cookie in step 2 is passed as the Cookie in step 1.

Impact

This is generally going to be a problem for developers of backend services that implement third party auth features and use other features like token refresh. The moment a third party service responds by setting a cookie in the response, the CookieStore will effectively break almost every follow-up request (hopefully by being rejected, but possibly by revealing a different user's information).

If your service sets cookies based on the response that happens here, it's possible to lead to even greater levels of exposure.

Workaroud

You can avoid this issue by disabling the CookieStore during client creation:

DefaultAsyncHttpClientConfig.Builder clientBuilder = Dsl.config() .setCookieStore(null) // other configuration ;

Пакеты

Наименование

org.asynchttpclient:async-http-client

maven
Затронутые версииВерсия исправления

>= 2.1.0, < 2.12.4

2.12.4

Наименование

org.asynchttpclient:async-http-client

maven
Затронутые версииВерсия исправления

>= 3.0.0.Beta1, < 3.0.1

3.0.1

EPSS

Процентиль: 44%
0.00216
Низкий

9.2 Critical

CVSS4

Дефекты

CWE-287

Связанные уязвимости

ubuntu
около 1 года назад

The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.

CVSS3: 8.1
redhat
около 1 года назад

The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.

nvd
около 1 года назад

The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests.

debian
около 1 года назад

The AsyncHttpClient (AHC) library allows Java applications to easily e ...

CVSS3: 8.1
fstec
больше 1 года назад

Уязвимость класса RequestBuilder интерфейса CookieStore асинхронной библиотеки обработки HTTP-запросов Async Http Client, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 44%
0.00216
Низкий

9.2 Critical

CVSS4

Дефекты

CWE-287