org.apache.cxf:cxf-bundle@2.5.2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.cxf:cxf-bundle package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

org.apache.cxf:cxf-bundle is a services framework that helps you build and develop services using frontend programming APIs.

Affected versions of this package are vulnerable to Denial of Service (DoS) via a large invalid SOAP message.

How to fix Denial of Service (DoS)?

Upgrade org.apache.cxf:cxf-bundle to version 2.2, 2.6.14, 2.7.11 or higher.

[2.1.10,2.2) [2.2.6,2.6.14) [2.7.0,2.7.11)
  • M
Information Exposure

org.apache.cxf:cxf-bundle is a services framework that helps you build and develop services using frontend programming APIs.

Affected versions of this package are vulnerable to Information Exposure. The SymmetricBinding when EncryptBeforeSigning is enabled and the UsernameToken policy is set to an EncryptedSupportingToken, transmits the UsernameToken in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.

How to fix Information Exposure?

Upgrade org.apache.cxf:cxf-bundle to version 2.6.13, 2.7.10 or higher.

[2.0.6,2.6.13) [2.7.0,2.7.10)
  • C
Improper Verification of Cryptographic Signature

org.apache.cxf:cxf-bundle is a services framework that helps you build and develop services using frontend programming APIs.

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature. When a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, it does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.

How to fix Improper Verification of Cryptographic Signature?

Upgrade org.apache.cxf:cxf-bundle to version 2.4.8, 2.5.4, 2.6.1 or higher.

[2.4.0,2.4.8) [2.5.0,2.5.4) [2.6.0,2.6.1)
  • M
Cryptographic Issues

org.apache.cxf:cxf-bundle is an open source services framework. Apache CFX 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka "XML Encryption backwards compatibility attack."

[2.5.0,2.5.7) [2.6.0,2.6.4) [2.7.0,2.7.1)
  • M
Authentication Bypass

org.apache.cxf:cxf-bundle is an open source services framework. Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element.

[2.4.1,2.5.9) [2.6.0,2.6.6) [2.7.0,2.7.3)
  • M
Authentication Bypass

org.apache.cxf:cxf-bundle is an open source services framework. Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.

[2.6.0,2.6.2) [2.5.0,2.5.5) [,2.4.9)
  • M
Improper Authentication

org.apache.cxf:cxf-bundle is an services framework that helps you build and develop services using frontend programming APIs.

Affected versions of this package are vulnerable to Improper Authentication. The URIMappingInterceptor, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request.

How to fix Improper Authentication?

Upgrade org.apache.cxf:cxf-bundle to version 2.5.8, 2.6.5, 2.7.2 or higher.

[,2.5.8) [2.6.0,2.6.5) [2.7.0,2.7.2)