CVE-2017-12624
- EPSS 2.51%
- Published 14.11.2017 16:29:00
- Last modified 20.04.2025 01:37:25
Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS a...
CVE-2017-3156
- EPSS 13.07%
- Published 10.08.2017 18:29:00
- Last modified 20.04.2025 01:37:25
The OAuth2 Hawk and JOSE MAC Validation code in Apache CXF prior to 3.0.13 and 3.1.x prior to 3.1.10 is not using a constant time MAC signature comparison algorithm which may be exploited by sophisticated timing attacks.
CVE-2016-8739
- EPSS 2.67%
- Published 10.08.2017 18:29:00
- Last modified 20.04.2025 01:37:25
The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk.
CVE-2016-6812
- EPSS 6.75%
- Published 10.08.2017 16:29:00
- Last modified 20.04.2025 01:37:25
The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the ba...
CVE-2012-0803
- EPSS 0.67%
- Published 08.08.2017 21:29:00
- Last modified 20.04.2025 01:37:25
The WS-SP UsernameToken policy in Apache CXF 2.4.5 and 2.5.1 allows remote attackers to bypass authentication by sending an empty UsernameToken as part of a SOAP request.
CVE-2017-5656
- EPSS 3.8%
- Published 18.04.2017 16:59:00
- Last modified 20.04.2025 01:37:25
Apache CXF's STSClient before 3.1.11 and 3.0.13 uses a flawed way of caching tokens that are associated with delegation tokens, which means that an attacker could craft a token which would return an identifer corresponding to a cached token for anoth...
CVE-2017-5653
- EPSS 3.17%
- Published 18.04.2017 16:59:00
- Last modified 20.04.2025 01:37:25
JAX-RS XML Security streaming clients in Apache CXF before 3.1.11 and 3.0.13 do not validate that the service response was signed or encrypted, which allows remote attackers to spoof servers.
- EPSS 0.34%
- Published 18.11.2015 16:59:00
- Last modified 12.04.2025 10:46:40
The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."
- EPSS 2.49%
- Published 30.10.2014 14:55:07
- Last modified 12.04.2025 10:46:40
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote atta...
- EPSS 5.6%
- Published 30.10.2014 14:55:07
- Last modified 12.04.2025 10:46:40
The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service...