org.apache.cxf:cxf-rt-ws-security@2.7.7 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.cxf:cxf-rt-ws-security package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Session Fixation

org.apache.cxf:cxf-rt-ws-security is an open source services framework.

Apache CXF's STSClient before 3.1.11 and 3.0.13 uses a flawed way of caching tokens that are associated with delegation tokens, which means that an attacker could craft a token which would return an identifer corresponding to a cached token for another user.

[,3.0.14) [3.1.0,3.1.11)
  • M
Improper Authentication

org.apache.cxf:cxf-rt-ws-security is a services framework that helps you build and develop services using frontend programming APIs, like JAX-WS and JAX-RS.

Affected versions of this package are vulnerable to Improper Authentication. When using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.

How to fix Improper Authentication?

Upgrade org.apache.cxf:cxf-rt-ws-security to version 2.7.13, 3.0.2 or higher.

[2,2.7.13) [3.0.0,3.0.2)
  • M
Information Exposure

org.apache.cxf:cxf-rt-ws-security is a services framework that helps you build and develop services using frontend programming APIs, like JAX-WS and JAX-RS.

Affected versions of this package are vulnerable to Information Exposure. The SymmetricBinding when EncryptBeforeSigning is enabled and the UsernameToken policy is set to an EncryptedSupportingToken, transmits the UsernameToken in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.

How to fix Information Exposure?

Upgrade org.apache.cxf:cxf-rt-ws-security to version 2.6.13, 2.7.10, 3.0.0-milestone2 or higher.

[2.0.6,2.6.13) [2.7.0,2.7.10) [3.0.0-milestone1,3.0.0-milestone2)