Timing Attack Affecting org.apache.cxf:cxf-rt-rs-security-oauth2 package, versions [,3.0.13)[3.1.0,3.1.10)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.26% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHECXF-31426
  • published21 May 2017
  • disclosed23 Feb 2017
  • creditRichard Kettelerij

Introduced: 23 Feb 2017

CVE-2017-3156  (opens in a new tab)
CWE-385  (opens in a new tab)

How to fix?

Upgrade org.apache.cxf:cxf-rt-rs-security-oauth2 to version 3.0.13, 3.1.10 or higher.

Overview

org.apache.cxf:cxf-rt-rs-security-oauth2 is a services framework.

Affected versions of this package are vulnerable to Timing Attack because it does not use a constant time MAC signature comparison algorithm.

CVSS Scores

version 3.1