Apache

Cxf

43 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.51%
  • Veröffentlicht 14.11.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS a...

  • EPSS 13.07%
  • Veröffentlicht 10.08.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The OAuth2 Hawk and JOSE MAC Validation code in Apache CXF prior to 3.0.13 and 3.1.x prior to 3.1.10 is not using a constant time MAC signature comparison algorithm which may be exploited by sophisticated timing attacks.

  • EPSS 2.67%
  • Veröffentlicht 10.08.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk.

  • EPSS 6.75%
  • Veröffentlicht 10.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the ba...

  • EPSS 0.67%
  • Veröffentlicht 08.08.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The WS-SP UsernameToken policy in Apache CXF 2.4.5 and 2.5.1 allows remote attackers to bypass authentication by sending an empty UsernameToken as part of a SOAP request.

  • EPSS 3.8%
  • Veröffentlicht 18.04.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Apache CXF's STSClient before 3.1.11 and 3.0.13 uses a flawed way of caching tokens that are associated with delegation tokens, which means that an attacker could craft a token which would return an identifer corresponding to a cached token for anoth...

  • EPSS 3.17%
  • Veröffentlicht 18.04.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

JAX-RS XML Security streaming clients in Apache CXF before 3.1.11 and 3.0.13 do not validate that the service response was signed or encrypted, which allows remote attackers to spoof servers.

  • EPSS 0.34%
  • Veröffentlicht 18.11.2015 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."

  • EPSS 2.49%
  • Veröffentlicht 30.10.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote atta...

  • EPSS 5.6%
  • Veröffentlicht 30.10.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service...