Vulnerabilites related to Apache Software Foundation - Apache HttpComponents
CVE-2025-27820 (GCVE-0-2025-27820)
Vulnerability from cvelistv5
Published
2025-04-24 11:44
Modified
2025-06-04 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- PSL Validation Bypass in Apache HttpClient 5.4.x
Summary
A bug in PSL validation logic in Apache HttpClient 5.4.x disables domain checks, affecting cookie management and host name verification. Discovered by the Apache HttpClient team. Fixed in the 5.4.3 release
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache HttpComponents |
Version: 5.4.0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-27820", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-24T14:58:16.247019Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-24T15:00:16.197Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-05-16T23:03:12.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250516-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache HttpComponents", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "5.4.3", "status": "affected", "version": "5.4.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "remediation developer", "value": "Joe Gallo" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003ccode\u003eA bug in PSL validation logic in Apache HttpClient 5.4.x disables domain checks, affecting cookie management and host name verification. Discovered by the Apache HttpClient team. Fixed in the 5.4.3 release\u003cbr\u003e\u003c/code\u003e" } ], "value": "A bug in PSL validation logic in Apache HttpClient 5.4.x disables domain checks, affecting cookie management and host name verification. Discovered by the Apache HttpClient team. Fixed in the 5.4.3 release" } ], "metrics": [ { "other": { "content": { "text": "moderate" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "description": "PSL Validation Bypass in Apache HttpClient 5.4.x", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-04T11:20:12.764Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "patch" ], "url": "https://github.com/apache/httpcomponents-client/pull/574" }, { "tags": [ "patch" ], "url": "https://github.com/apache/httpcomponents-client/pull/621" }, { "tags": [ "product" ], "url": "https://hc.apache.org/httpcomponents-client-5.4.x/index.html" }, { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/55xhs40ncqv97qvoocok44995xp5kqn8" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache HttpComponents: PSL (Public Suffix List) validation bypass", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2025-27820", "datePublished": "2025-04-24T11:44:25.986Z", "dateReserved": "2025-03-07T12:47:46.839Z", "dateUpdated": "2025-06-04T11:20:12.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }