プラットフォーム
java
コンポーネント
org.asynchttpclient:async-http-client
修正版
3.0.2
2.12.4
CVE-2024-53990 is a critical vulnerability affecting versions of Async HTTP Client up to 2.9.0. This flaw allows an attacker to hijack user sessions by silently replacing explicitly defined cookies with those from the internal CookieStore. The vulnerability stems from how the CookieStore handles cookie replacement, potentially impacting multi-user applications. A fix is available in version 2.12.4.
The core of this vulnerability lies in the asynchronous nature of Async HTTP Client and its automatic CookieStore management. When making HTTP requests, the CookieStore silently overwrites explicitly provided cookies with any cookies sharing the same name that are already stored within the jar. In multi-user environments, this means a malicious actor could potentially craft a request that replaces one user's session cookie with another's, effectively impersonating that user. This could lead to unauthorized access to sensitive data, modification of user accounts, or even complete control over the application. The impact is particularly severe for applications handling sensitive information like financial transactions or personal data, as session hijacking can grant attackers full access to user accounts and associated resources.
This vulnerability is considered high probability due to the ease of exploitation and the potential for widespread impact. A public proof-of-concept (POC) is available, demonstrating the cookie hijacking technique. While no active exploitation campaigns have been publicly confirmed as of the publication date (2024-12-02), the availability of a POC significantly increases the risk of exploitation. The vulnerability has been added to the CISA KEV catalog, indicating a heightened level of concern within the cybersecurity community.
Applications utilizing Async HTTP Client versions 2.9.0 and earlier, particularly those deployed in multi-user environments or handling sensitive data, are at significant risk. Shared hosting environments where multiple applications share the same Async HTTP Client instance are especially vulnerable, as a compromise in one application could potentially impact others.
• java / application: Monitor application logs for unexpected cookie values or unusual user activity. Examine request payloads for attempts to inject malicious cookies. • java / dependency: Use dependency scanning tools to identify instances of vulnerable Async HTTP Client versions in your projects.
./mvn dependency:tree | grep 'org.asynchttpclient:async-http-client' • generic web: Inspect HTTP response headers for unexpected cookie values. Use browser developer tools to monitor cookie behavior during user sessions. • generic web: Check for unusual user sessions or login attempts in application logs.
disclosure
poc
patch
エクスプロイト状況
EPSS
0.33% (55% パーセンタイル)
CISA SSVC
The primary mitigation for CVE-2024-53990 is to upgrade to version 2.12.4 or later of Async HTTP Client. If an immediate upgrade is not feasible due to compatibility issues or breaking changes, consider disabling the automatic CookieStore and managing cookies explicitly in your application code. This provides greater control over cookie handling and prevents the silent replacement behavior. As a temporary workaround, you could implement stricter cookie validation logic within your application to detect and reject unexpected cookie values. Monitor application logs for unusual cookie activity, which could indicate an attempted exploitation. After upgrading, confirm the fix by sending requests with explicit cookies and verifying that they are not being overwritten by the CookieStore.
Actualice la biblioteca AsyncHttpClient a la versión 2.5.4 o superior. Esta versión corrige la vulnerabilidad que permite la sustitución de cookies definidas explícitamente por cookies almacenadas en el CookieStore, evitando así posibles problemas de seguridad relacionados con la gestión de sesiones de usuario.
脆弱性分析と重要アラートをメールでお届けします。
CVE-2024-53990 is a critical vulnerability in Async HTTP Client versions up to 2.9.0 where the CookieStore silently replaces explicit cookies, potentially leading to user session hijacking.
If you are using Async HTTP Client versions 2.9.0 or earlier, you are potentially affected by this vulnerability. Upgrade to 2.12.4 to mitigate the risk.
The recommended fix is to upgrade to version 2.12.4 or later. If an upgrade is not immediately possible, disable the automatic CookieStore and manage cookies explicitly.
While no active exploitation campaigns have been publicly confirmed, a public proof-of-concept exists, increasing the risk of exploitation.
Refer to the Async HTTP Client GitHub issue for details: https://github.com/AsyncHttpClient/async-http-client/issues/1964
pom.xml ファイルをアップロードすると、影響の有無を即座にお知らせします。