cxf-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From build...@apache.org
Subject svn commit: r1010664 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2017-5653.txt.asc security-advisories.data/CVE-2017-5656.txt.asc security-advisories.html
Date Tue, 18 Apr 2017 11:47:43 GMT
Author: buildbot
Date: Tue Apr 18 11:47:43 2017
New Revision: 1010664

Log:
Production update by buildbot for cxf

Added:
    websites/production/cxf/content/security-advisories.data/CVE-2017-5653.txt.asc
    websites/production/cxf/content/security-advisories.data/CVE-2017-5656.txt.asc
Modified:
    websites/production/cxf/content/cache/main.pageCache
    websites/production/cxf/content/security-advisories.html

Modified: websites/production/cxf/content/cache/main.pageCache
==============================================================================
Binary files - no diff available.

Added: websites/production/cxf/content/security-advisories.data/CVE-2017-5653.txt.asc
==============================================================================
--- websites/production/cxf/content/security-advisories.data/CVE-2017-5653.txt.asc (added)
+++ websites/production/cxf/content/security-advisories.data/CVE-2017-5653.txt.asc Tue Apr
18 11:47:43 2017
@@ -0,0 +1,49 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA256
+
+CVE-2017-5653: Apache CXF JAX-RS XML Security streaming clients do not validate that the
service response was signed or encrypted.
+
+Severity: Moderate
+
+Vendor: The Apache Software Foundation
+
+Versions Affected:
+
+This vulnerability affects all versions of Apache CXF prior to 3.1.11 and
+3.0.13.
+
+Description:
+
+Apache CXF supports the ability to use XML Signature and encryption to secure
+JAX-RS services. Two different implementations are available, a DOM based 
+approach that works on a model of the message in memory before applying
+security, and a streaming based implementation that is a useful alternative
+for larger messages.
+
+There is a bug in validating messages for JAX-RS clients using the streaming
+approach, where it will not enforce that the message is signed and/or
+encrypted. An exception is thrown in these cases but not properly propagated
+to the client code. The bug does not apply for the DOM clients and it does not
+apply for the streaming server side case.
+
+This has been fixed in revision:
+
+https://git-wip-us.apache.org/repos/asf?p=cxf.git;a=commit;h=fade9b81dabe27f864ca38e7b40f28fb44d6f165
+
+Migration:
+
+Apache CXF users should upgrade to 3.1.11 or 3.0.13 or later as soon as
+possible. In addition, instead of adding the JAX-RS XmlSecInInterceptor to the
+CXF in-interceptor chain for the client, it is necessary to add it as a 
+JAX-RS provider instead.
+
+-----BEGIN PGP SIGNATURE-----
+
+iQEcBAEBCAAGBQJY8OBOAAoJEGe/gLEK1TmDMa0H/Rugu02xhfi2Iih0INf0j3F3
+kWWCOEzyrbecdYDeJDsI6UB0djIugDlOyrN0KizD20dz9MMWLsmveao7i9D90pCH
+GbNbAb8r1DkpMdH31G2bqueQ2dM6vpYfuvNwVRlLGajGro59YrWzD2D17CVGDtvY
+ceKqYn1530Md9y2x1DY+vE4HaBsDtL+CmGK459AP09h4eflYvjfa5Y7v1tsZDosR
+N9JjaN0XVNnAyOz8QVqCC1dugIqsGMelfEc+WKKxAn+tkC5PZrjoRtOgkHwVfr1v
+FSLfbI8JajjNcxUz/d5y9jY/OIEWbeRukmHv9nLT+2RQFZfxtY+Kpp8vr/SuLwQ=
+=/38f
+-----END PGP SIGNATURE-----

Added: websites/production/cxf/content/security-advisories.data/CVE-2017-5656.txt.asc
==============================================================================
--- websites/production/cxf/content/security-advisories.data/CVE-2017-5656.txt.asc (added)
+++ websites/production/cxf/content/security-advisories.data/CVE-2017-5656.txt.asc Tue Apr
18 11:47:43 2017
@@ -0,0 +1,46 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA256
+
+CVE-2017-5656: Apache CXF's STSClient uses a flawed way of caching tokens that are associated
with delegation tokens. 
+
+Severity: Moderate
+
+Vendor: The Apache Software Foundation
+
+Versions Affected:
+
+This vulnerability affects all versions of Apache CXF prior to 3.1.11 and
+3.0.13.
+
+Description:
+
+An Apache CXF endpoint can be used as an intermediary, where a token credential
+from the received message is used as a delegation token to obtain a new token
+from a Security Token Service (STS) for the outbound request.
+
+By default, the token retrieved from the STS is cached and associated with the
+delegation token via an identifier extracted from the delegation token. 
+
+However, there is a weakness in how the identifier is extracted from the
+delegation token, which means that an attacker could craft a token which 
+would return an identifer corresponding to a cached token for another user.
+
+This has been fixed in revision:
+
+https://git1-us-west.apache.org/repos/asf?p=cxf.git;a=commit;h=66c2c5b9
+
+Migration:
+
+Apache CXF users should upgrade to 3.1.11 or 3.0.13 or later as soon as
+possible.
+
+-----BEGIN PGP SIGNATURE-----
+
+iQEcBAEBCAAGBQJY8OBVAAoJEGe/gLEK1TmD/8wIAIHBgZE2PEfvnltqUCkaJDKJ
+2FxI5CYZBuSS2W5JQxPu9BOVBzFE4q1EhNpFklbV/0xucuSq7aM7QKmCkj1DJ5kV
+ftdJomkzb1WWecKcuTb/rdip0i+DeaOcz8f7Q7vRxoFm9080obzYrjsA1i6bgcSL
+gkCd+OegoaZpOfcvZl+sXLXCGb49uJHaZA9YWVrukOBRuKzxMqHSQTYYW996a63N
+hLkMIChKDNyihSWU8niuvEw35apjFeo6GXwDHfvn4XhBNf3OtgBVQQpP7PGKJmA5
+rEh2HlFhUzEBlzELIiC6sbpLxuj1gdOEjUWE4OjJb9sSfel07ZbNTjVxmN3wgjU=
+=HOyH
+-----END PGP SIGNATURE-----

Modified: websites/production/cxf/content/security-advisories.html
==============================================================================
--- websites/production/cxf/content/security-advisories.html (original)
+++ websites/production/cxf/content/security-advisories.html Tue Apr 18 11:47:43 2017
@@ -99,7 +99,7 @@ Apache CXF -- Security Advisories
          <td height="100%">
            <!-- Content -->
            <div class="wiki-content">
-<div id="ConfluenceContent"><h3 id="SecurityAdvisories-2017">2017</h3><ul><li><a
shape="rect" href="security-advisories.data/CVE-2017-3156.txt.asc?version=1&amp;modificationDate=1487590374755&amp;api=v2"
data-linked-resource-id="68715428" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-3156.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2017-3156</a>:
Apache CXF OAuth2 Hawk and JOSE MAC Validation code is vulnerable to the timing attacks</li></ul><h3
id="SecurityAdvisories-2016">2016</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2016-8739.txt.asc?version=1&amp;modificationDate=1482164360000&amp;api=v2"
data-linked-resource-id="67635454" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2016-8739.txt.asc" data-n
 ice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="27837502"
data-linked-resource-container-version="24">CVE-2016-8739</a>: Atom entity provider
of Apache CXF JAX-RS is vulnerable to XXE</li><li><a shape="rect" href="security-advisories.data/CVE-2016-6812.txt.asc?version=1&amp;modificationDate=1482164360000&amp;api=v2"
data-linked-resource-id="67635455" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2016-6812.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2016-6812</a>:
XSS risk in Apache CXF FormattedServiceListWriter when a request URL contains matrix parameters</li><li><a
shape="rect" href="security-advisories.data/CVE-2016-4464.txt.asc?version=1&amp;modificationDate=1473350153000&amp;api=v2"
data-linked-resource-id="65869472" data-linked
 -resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2016-4464.txt.asc"
data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="27837502"
data-linked-resource-container-version="24">CVE-2016-4464</a>: Apache CXF Fediz application
plugins do not match the SAML AudienceRestriction values against the list of configured audience
URIs</li></ul><h3 id="SecurityAdvisories-2015">2015</h3><ul><li><a
shape="rect" href="security-advisories.data/CVE-2015-5253.txt.asc?version=1&amp;modificationDate=1447433340000&amp;api=v2"
data-linked-resource-id="61328642" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-5253.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2015-5253</a>:
Apache CXF SAML SSO processing 
 is vulnerable to a wrapping attack</li><li><a shape="rect" href="security-advisories.data/CVE-2015-5175.txt.asc?version=1&amp;modificationDate=1440598018000&amp;api=v2"
data-linked-resource-id="61316328" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-5175.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2015-5175</a>:
Apache CXF Fediz application plugins are vulnerable to Denial of Service (DoS) attacks</li></ul><h3
id="SecurityAdvisories-2014">2014</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2014-3577.txt.asc?version=1&amp;modificationDate=1419245371000&amp;api=v2"
data-linked-resource-id="51183657" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-3577.txt.asc" data-nice-type="Text File" data-linked-res
 ource-content-type="text/plain" data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2014-3577</a>:
Apache CXF SSL hostname verification bypass</li><li><a shape="rect" href="security-advisories.data/CVE-2014-3566.txt.asc?version=1&amp;modificationDate=1418740474000&amp;api=v2"
data-linked-resource-id="50561078" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-3566.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">Note
on CVE-2014-3566</a>: SSL 3.0 support in Apache CXF, aka the "POODLE" attack.</li><li><a
shape="rect" href="security-advisories.data/CVE-2014-3623.txt.asc?version=1&amp;modificationDate=1414169368000&amp;api=v2"
data-linked-resource-id="47743195" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-defau
 lt-alias="CVE-2014-3623.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2014-3623</a>:
Apache CXF does not properly enforce the security semantics of SAML SubjectConfirmation methods
when used with the TransportBinding</li><li><a shape="rect" href="security-advisories.data/CVE-2014-3584.txt.asc?version=1&amp;modificationDate=1414169326000&amp;api=v2"
data-linked-resource-id="47743194" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-3584.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2014-3584</a>:
Apache CXF JAX-RS SAML handling is vulnerable to a Denial of Service (DoS) attack</li><li><a
shape="rect" href="security-advisories.data/CVE-2014-0109.txt.asc?version=1
 &amp;modificationDate=1398873370000&amp;api=v2" data-linked-resource-id="40895138"
data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2014-0109.txt.asc"
data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="27837502"
data-linked-resource-container-version="24">CVE-2014-0109</a>: HTML content posted
to SOAP endpoint could cause OOM errors</li><li><a shape="rect" href="security-advisories.data/CVE-2014-0110.txt.asc?version=1&amp;modificationDate=1398873378000&amp;api=v2"
data-linked-resource-id="40895139" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0110.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2014-0110</a>:
Large invalid content could cause temporary space to fill</
 li><li><a shape="rect" href="security-advisories.data/CVE-2014-0034.txt.asc?version=1&amp;modificationDate=1398873385000&amp;api=v2"
data-linked-resource-id="40895140" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0034.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2014-0034</a>:
The SecurityTokenService accepts certain invalid SAML Tokens as valid</li><li><a
shape="rect" href="security-advisories.data/CVE-2014-0035.txt.asc?version=1&amp;modificationDate=1398873391000&amp;api=v2"
data-linked-resource-id="40895141" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0035.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-contai
 ner-version="24">CVE-2014-0035</a>: UsernameTokens are sent in plaintext with a
Symmetric EncryptBeforeSigning policy</li></ul><h3 id="SecurityAdvisories-2013">2013</h3><ul><li><a
shape="rect" href="security-advisories.data/CVE-2013-2160.txt.asc?version=1&amp;modificationDate=1372324301000&amp;api=v2"
data-linked-resource-id="33095710" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2013-2160.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="24">CVE-2013-2160</a>
- Denial of Service Attacks on Apache CXF</li><li><a shape="rect" href="cve-2012-5575.html">Note
on CVE-2012-5575</a> - XML Encryption backwards compatibility attack on Apache CXF.</li><li><a
shape="rect" href="cve-2013-0239.html">CVE-2013-0239</a> - Authentication bypass
in the case of WS-SecurityPolicy enabled plaintext UsernameTokens.</li></u
 l><h3 id="SecurityAdvisories-2012">2012</h3><ul><li><a shape="rect"
href="cve-2012-5633.html">CVE-2012-5633</a> - WSS4JInInterceptor always allows HTTP
Get requests from browser.</li><li><a shape="rect" href="note-on-cve-2011-2487.html">Note
on CVE-2011-2487</a> - Bleichenbacher attack against distributed symmetric key in WS-Security.</li><li><a
shape="rect" href="cve-2012-3451.html">CVE-2012-3451</a> - Apache CXF is vulnerable
to SOAP Action spoofing attacks on Document Literal web services.</li><li><a
shape="rect" href="cve-2012-2379.html">CVE-2012-2379</a> - Apache CXF does not verify
that elements were signed or encrypted by a particular Supporting Token.</li><li><a
shape="rect" href="cve-2012-2378.html">CVE-2012-2378</a> - Apache CXF does not pick
up some child policies of WS-SecurityPolicy 1.1 SupportingToken policy assertions on the client
side.</li><li><a shape="rect" href="note-on-cve-2011-1096.html">Note on
CVE-2011-1096</a> - XML Encryption flaw / Character pattern encodi
 ng attack.</li><li><a shape="rect" href="cve-2012-0803.html">CVE-2012-0803</a>
- Apache CXF does not validate UsernameToken policies correctly.</li></ul><h3
id="SecurityAdvisories-2010">2010</h3><ul><li><a shape="rect" class="external-link"
href="http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf">CVE-2010-2076</a>
- DTD based XML attacks.</li></ul></div>
+<div id="ConfluenceContent"><h3 id="SecurityAdvisories-2017">2017</h3><ul><li><a
shape="rect" href="security-advisories.data/CVE-2017-3156.txt.asc?version=1&amp;modificationDate=1487590374000&amp;api=v2"
data-linked-resource-id="68715428" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-3156.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2017-3156</a>:
Apache CXF OAuth2 Hawk and JOSE MAC Validation code is vulnerable to the timing attacks</li><li><a
shape="rect" href="security-advisories.data/CVE-2017-5653.txt.asc?version=1&amp;modificationDate=1492515074710&amp;api=v2"
data-linked-resource-id="69406542" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-5653.txt.asc" data-nice-type="Text File" data-linked-resource-content-t
 ype="text/plain" data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2017-5653</a>:
Apache CXF JAX-RS XML Security streaming clients do not validate that the service response
was signed or encrypted.</li><li><a shape="rect" href="security-advisories.data/CVE-2017-5656.txt.asc?version=1&amp;modificationDate=1492515113282&amp;api=v2"
data-linked-resource-id="69406543" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-5656.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2017-5656</a>:
Apache CXF's STSClient uses a flawed way of caching tokens that are associated with delegation
tokens.</li></ul><h3 id="SecurityAdvisories-2016">2016</h3><ul><li><a
shape="rect" href="security-advisories.data/CVE-2016-8739.txt.asc?version=1&amp;modificationDate=148216436000
 0&amp;api=v2" data-linked-resource-id="67635454" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2016-8739.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2016-8739</a>:
Atom entity provider of Apache CXF JAX-RS is vulnerable to XXE</li><li><a shape="rect"
href="security-advisories.data/CVE-2016-6812.txt.asc?version=1&amp;modificationDate=1482164360000&amp;api=v2"
data-linked-resource-id="67635455" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2016-6812.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2016-6812</a>:
XSS risk in Apache CXF FormattedServiceListWriter when a request URL contains matrix param
 eters</li><li><a shape="rect" href="security-advisories.data/CVE-2016-4464.txt.asc?version=1&amp;modificationDate=1473350153000&amp;api=v2"
data-linked-resource-id="65869472" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2016-4464.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2016-4464</a>:
Apache CXF Fediz application plugins do not match the SAML AudienceRestriction values against
the list of configured audience URIs</li></ul><h3 id="SecurityAdvisories-2015">2015</h3><ul><li><a
shape="rect" href="security-advisories.data/CVE-2015-5253.txt.asc?version=1&amp;modificationDate=1447433340000&amp;api=v2"
data-linked-resource-id="61328642" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-5253.txt.asc" data-nice-type="Text File" 
 data-linked-resource-content-type="text/plain" data-linked-resource-container-id="27837502"
data-linked-resource-container-version="25">CVE-2015-5253</a>: Apache CXF SAML SSO
processing is vulnerable to a wrapping attack</li><li><a shape="rect" href="security-advisories.data/CVE-2015-5175.txt.asc?version=1&amp;modificationDate=1440598018000&amp;api=v2"
data-linked-resource-id="61316328" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-5175.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2015-5175</a>:
Apache CXF Fediz application plugins are vulnerable to Denial of Service (DoS) attacks</li></ul><h3
id="SecurityAdvisories-2014">2014</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2014-3577.txt.asc?version=1&amp;modificationDate=1419245371000&amp;api=v2"
data-linked-resource-i
 d="51183657" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2014-3577.txt.asc"
data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="27837502"
data-linked-resource-container-version="25">CVE-2014-3577</a>: Apache CXF SSL hostname
verification bypass</li><li><a shape="rect" href="security-advisories.data/CVE-2014-3566.txt.asc?version=1&amp;modificationDate=1418740474000&amp;api=v2"
data-linked-resource-id="50561078" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-3566.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">Note
on CVE-2014-3566</a>: SSL 3.0 support in Apache CXF, aka the "POODLE" attack.</li><li><a
shape="rect" href="security-advisories.data/CVE-2014-3623.txt.asc?vers
 ion=1&amp;modificationDate=1414169368000&amp;api=v2" data-linked-resource-id="47743195"
data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2014-3623.txt.asc"
data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="27837502"
data-linked-resource-container-version="25">CVE-2014-3623</a>: Apache CXF does not
properly enforce the security semantics of SAML SubjectConfirmation methods when used with
the TransportBinding</li><li><a shape="rect" href="security-advisories.data/CVE-2014-3584.txt.asc?version=1&amp;modificationDate=1414169326000&amp;api=v2"
data-linked-resource-id="47743194" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-3584.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">C
 VE-2014-3584</a>: Apache CXF JAX-RS SAML handling is vulnerable to a Denial of Service
(DoS) attack</li><li><a shape="rect" href="security-advisories.data/CVE-2014-0109.txt.asc?version=1&amp;modificationDate=1398873370000&amp;api=v2"
data-linked-resource-id="40895138" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0109.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2014-0109</a>:
HTML content posted to SOAP endpoint could cause OOM errors</li><li><a shape="rect"
href="security-advisories.data/CVE-2014-0110.txt.asc?version=1&amp;modificationDate=1398873378000&amp;api=v2"
data-linked-resource-id="40895139" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0110.txt.asc" data-nice-type="Text File" data-linked-resource-content
 -type="text/plain" data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2014-0110</a>:
Large invalid content could cause temporary space to fill</li><li><a shape="rect"
href="security-advisories.data/CVE-2014-0034.txt.asc?version=1&amp;modificationDate=1398873385000&amp;api=v2"
data-linked-resource-id="40895140" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0034.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2014-0034</a>:
The SecurityTokenService accepts certain invalid SAML Tokens as valid</li><li><a
shape="rect" href="security-advisories.data/CVE-2014-0035.txt.asc?version=1&amp;modificationDate=1398873391000&amp;api=v2"
data-linked-resource-id="40895141" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resourc
 e-default-alias="CVE-2014-0035.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2014-0035</a>:
UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy</li></ul><h3
id="SecurityAdvisories-2013">2013</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2013-2160.txt.asc?version=1&amp;modificationDate=1372324301000&amp;api=v2"
data-linked-resource-id="33095710" data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2013-2160.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="27837502" data-linked-resource-container-version="25">CVE-2013-2160</a>
- Denial of Service Attacks on Apache CXF</li><li><a shape="rect" href="cve-2012-5575.html">Note
on CVE-2012-5575</a> - XML Encryption backwards compatibility at
 tack on Apache CXF.</li><li><a shape="rect" href="cve-2013-0239.html">CVE-2013-0239</a>
- Authentication bypass in the case of WS-SecurityPolicy enabled plaintext UsernameTokens.</li></ul><h3
id="SecurityAdvisories-2012">2012</h3><ul><li><a shape="rect" href="cve-2012-5633.html">CVE-2012-5633</a>
- WSS4JInInterceptor always allows HTTP Get requests from browser.</li><li><a
shape="rect" href="note-on-cve-2011-2487.html">Note on CVE-2011-2487</a> - Bleichenbacher
attack against distributed symmetric key in WS-Security.</li><li><a shape="rect"
href="cve-2012-3451.html">CVE-2012-3451</a> - Apache CXF is vulnerable to SOAP Action
spoofing attacks on Document Literal web services.</li><li><a shape="rect"
href="cve-2012-2379.html">CVE-2012-2379</a> - Apache CXF does not verify that elements
were signed or encrypted by a particular Supporting Token.</li><li><a shape="rect"
href="cve-2012-2378.html">CVE-2012-2378</a> - Apache CXF does not pick up some child
policies of WS-SecurityPolicy 1.1 
 SupportingToken policy assertions on the client side.</li><li><a shape="rect"
href="note-on-cve-2011-1096.html">Note on CVE-2011-1096</a> - XML Encryption flaw
/ Character pattern encoding attack.</li><li><a shape="rect" href="cve-2012-0803.html">CVE-2012-0803</a>
- Apache CXF does not validate UsernameToken policies correctly.</li></ul><h3
id="SecurityAdvisories-2010">2010</h3><ul><li><a shape="rect" class="external-link"
href="http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf">CVE-2010-2076</a>
- DTD based XML attacks.</li></ul></div>
            </div>
            <!-- Content -->
          </td>



Mime
View raw message