Cross-Site Request Forgery (CSRF) Affecting org.apache.cxf.fediz:fediz-cxf package, versions [,1.3.2)[1.3.3, 1.4.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.16% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-Site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHECXFFEDIZ-32205
  • published15 Apr 2018
  • disclosed16 May 2017
  • creditUnknown

Introduced: 16 May 2017

CVE-2017-7662  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade org.apache.cxf.fediz:fediz-cxf to version 1.3.2, 1.4.0 or higher.

Overview

org.apache.cxf.fediz:fediz-cxf is a package that helps you secure your web applications by delegating security enforcement to the underlying application server.

Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). A malicious web application could create new clients, or reset secrets, etc, after the admin user has logged on to the client registration service and the session is still active.

CVSS Scores

version 3.1