Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+v+6sHAEKPnkign1BLuFpz-7D=MeWb51FrwQtVyA48DnfgAiQ@mail.gmail.com>
Date: Wed, 22 Apr 2026 08:47:31 +0200
From: Arturo Bernal <abernal@...che.org>
To: Apache Security Team <security@...che.org>, oss-security@...ts.openwall.com, 
	HttpComponents Project <dev@...apache.org>, 
	HttpClient User Discussion <httpclient-users@...apache.org>, xx@....ee
Subject: [SECURITY] CVE-2026-40542: Apache HttpClient 5.6 SCRAM-SHA-256 mutual
 authentication bypass

Severity: important

Affected versions:

   - Apache HttpClient 5.6

Description:
A missing critical step in authentication in Apache HttpClient 5.6 may
allow an attacker to cause the client to accept SCRAM-SHA-256
authentication without proper mutual authentication verification.


Users are recommended to upgrade to Apache HttpClient 5.6.1. which corrects
this issue.

Credit:
This issue was reported by Rasmus Moorats.


References:
https://hc.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-40542

https://github.com/apache/httpcomponents-client/commit/726eac2323d370435d8afca1e0540aa099927f18




Arturo

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.