org.apache.cxf:cxf-rt-ws-security@2.5.9 vulnerabilities

  • latest version

    4.0.5

  • latest non vulnerable version

  • first published

    16 years ago

  • latest version published

    5 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.cxf:cxf-rt-ws-security package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Session Fixation

    org.apache.cxf:cxf-rt-ws-security is an open source services framework.

    Apache CXF's STSClient before 3.1.11 and 3.0.13 uses a flawed way of caching tokens that are associated with delegation tokens, which means that an attacker could craft a token which would return an identifer corresponding to a cached token for another user.

    [,3.0.14)[3.1.0,3.1.11)
    • M
    Improper Authentication

    org.apache.cxf:cxf-rt-ws-security is a services framework that helps you build and develop services using frontend programming APIs, like JAX-WS and JAX-RS.

    Affected versions of this package are vulnerable to Improper Authentication. When using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.

    How to fix Improper Authentication?

    Upgrade org.apache.cxf:cxf-rt-ws-security to version 2.7.13, 3.0.2 or higher.

    [2,2.7.13)[3.0.0,3.0.2)
    • M
    Information Exposure

    org.apache.cxf:cxf-rt-ws-security is a services framework that helps you build and develop services using frontend programming APIs, like JAX-WS and JAX-RS.

    Affected versions of this package are vulnerable to Information Exposure. The SymmetricBinding when EncryptBeforeSigning is enabled and the UsernameToken policy is set to an EncryptedSupportingToken, transmits the UsernameToken in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.

    How to fix Information Exposure?

    Upgrade org.apache.cxf:cxf-rt-ws-security to version 2.6.13, 2.7.10, 3.0.0-milestone2 or higher.

    [2.0.6,2.6.13)[2.7.0,2.7.10)[3.0.0-milestone1,3.0.0-milestone2)