<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AsyncHttpClient — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/asynchttpclient/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 16:44:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/asynchttpclient/feed.xml" rel="self" type="application/rss+xml"/><item><title>async-http-client Cookie Header Leak on Cross-Origin Redirect</title><link>https://feed.craftedsignal.io/briefs/2026-05-async-http-cookie-leak/</link><pubDate>Mon, 18 May 2026 16:44:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-async-http-cookie-leak/</guid><description>The async-http-client library leaks `Cookie` headers to cross-origin redirect targets due to missing header stripping in `Redirect30xInterceptor.java`, potentially exposing sensitive information to malicious third parties.</description><content:encoded><![CDATA[<p>The async-http-client library is vulnerable to leaking <code>Cookie</code> headers to cross-origin redirect targets. Specifically, when following a redirect across a security boundary (different origin, or HTTPS→HTTP downgrade), the <code>propagatedHeaders()</code> method in <code>Redirect30xInterceptor.java</code> does not strip the <code>Cookie</code> header, leading to potential exposure of session cookies, CSRF tokens, and API keys. This vulnerability exists in versions of <code>async-http-client</code> between 3.0.0.Beta1 and 3.0.10, as well as between 2.0.0 and 2.15.0. Attackers can exploit this by crafting malicious redirects that forward sensitive cookie data to attacker-controlled destinations, potentially leading to session hijacking and data theft. This matters for defenders as it exposes applications using the affected library to significant security risks if they rely on redirects with cookies for authentication or authorization. The vulnerability is fixed in versions 3.0.10 and 2.15.0. CVE-2026-45300 has been assigned to this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim&rsquo;s application initiates an HTTP request to a trusted API endpoint.</li>
<li>The trusted API endpoint responds with a 302 redirect to a malicious URL (e.g., <code>https://evil.com</code>).</li>
<li>The <code>Redirect30xInterceptor.java</code> class in <code>async-http-client</code> processes the redirect.</li>
<li>The <code>propagatedHeaders()</code> method is called to determine which headers to forward.</li>
<li>Due to the vulnerability, the <code>Cookie</code> header is not stripped, unlike <code>Authorization</code> and <code>Proxy-Authorization</code>.</li>
<li>The <code>async-http-client</code> library forwards the original request, including the <code>Cookie</code> header, to the malicious URL.</li>
<li>The attacker-controlled server at <code>evil.com</code> receives the leaked <code>Cookie</code> header.</li>
<li>The attacker can then extract sensitive information from the <code>Cookie</code> header, such as session IDs, CSRF tokens, or API keys for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to:</p>
<ul>
<li><strong>Session hijacking</strong>: Attackers can use leaked session cookies to impersonate legitimate users.</li>
<li><strong>CSRF token theft</strong>: Attackers can steal CSRF tokens carried in cookies to perform unauthorized actions on behalf of the user.</li>
<li><strong>API key theft</strong>: Attackers can obtain API keys stored in cookies to access sensitive resources.</li>
<li><strong>Privacy breaches</strong>: Tracking identifiers leak to third-party origins, compromising user privacy.</li>
</ul>
<p>Attack scenarios include open-redirects in trusted API endpoints, compromised CDNs or API gateways injecting redirects, and man-in-the-middle attacks on plaintext hops in the redirect chain.  Organizations using vulnerable versions of <code>async-http-client</code> are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>async-http-client</code> to version 3.0.10 or 2.15.0 to patch the vulnerability as described in the fix details.</li>
<li>Deploy the Sigma rule &ldquo;Detect AsyncHttpClient Cookie Leak via Redirect&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review and audit application code to ensure proper handling of redirects and cookie security.</li>
<li>Monitor network traffic for suspicious redirects to external domains and unexpected cookie transfers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cookie</category><category>header</category><category>redirect</category><category>vulnerability</category><category>ghsa</category><category>CVE-2026-45300</category></item></channel></rss>