org.apache.wss4j:wss4j-ws-security-dom@2.0.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.wss4j:wss4j-ws-security-dom package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Improper Authentication

org.apache.wss4j:wss4j-ws-security-dom is a Web Services Security (WS-Security) library being developed at OASIS Web Services Security TC. WSS4J is a primarily a Java library that can be used to sign and verify SOAP Messages with WS-Security information. WSS4J will use Apache Axis and Apache XML-Security projects and will be interoperable with JAX-RPC based server/clients and .NET server/clients.

Affected versions of this package are vulnerable to Improper Authentication. When using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.

How to fix Improper Authentication?

Upgrade org.apache.wss4j:wss4j-ws-security-dom to version 2.0.2 or higher.

[2.0.0,2.0.2)
  • H
Use of a Risky Cryptographic Algorithm

org.apache.wss4j:wss4j-ws-security-dom Affected versions of the package use a Risky Cryptographic Algorithm. The PKCS#1 v1.5 Key Transport Algorithm is used to encrypt symmetric keys as part of WS-Security. WSS4J can leak information about where a particular decryption operation fails.

[2.0.0,2.0.2)
  • M
Access Restriction Bypass

org.apache.wss4j:wss4j-ws-security-dom Apache WSS4J before 1.6.17 and 2.x before 2.0.2 allows remote attackers to bypass the requireSignedEncryptedDataElements configuration via a vectors related to "wrapping attacks."

[2.0.0,2.0.2)