cxf-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Colm O hEigeartaigh <>
Subject Re: New security advisories for Apache CXF
Date Fri, 05 May 2017 15:49:26 GMT
Hi Dennis,

The Apache security team suggested I document my objection to the CVE in a
public place (this mailing list for example) before informing Mitre that
the CVE is disputed. So I'll do that in this post.

A security advisory was issued for Apache CXF back in 2012, where the
advisory itself was never agreed upon with the Apache CXF PMC:

In a nutshell, the advisory was that a sample that shipped with CXF had a
flag enabled which bypassed checking the DN check for a TLS certificate. We
since removed this flag from the sample configuration to prevent a user
unwittingly copying the configuration when setting up a deployment.
However, the fact remains that the issue reported was not a vulnerability
in CXF itself.

The issue has resurfaced recently in the context of the Maven Owasp
dependency checker, which downloads the advisory and is telling users of
(old) versions of CXF that there is a vulnerability associated with the
version they are using, when clearly there is not.


On Wed, Apr 19, 2017 at 3:04 PM, Colm O hEigeartaigh <>

> Thanks, I'm going to ask the Apache security team for some advice on how
> to handle this.
> Colm.
> On Wed, Apr 19, 2017 at 12:30 PM, Dennis Kieselhorst <>
> wrote:
>> > Could you file an issue with the OWasp plugin instead to remove this CVE
>> > from their list (if this is possible - I'm not sure how they are pulling
>> > down advisories)?
>> The plugin downloads the NVD CVE data hosted by NIST.
>> So to get rid of it, the configuration pattern
>> cpe:2.3:a:apache:cxf:-:*:*:*:*:*:*:* needs to be changed:
>> No idea how to achieve that.
>> Regards
>> Dennis
> --
> Colm O hEigeartaigh
> Talend Community Coder

Colm O hEigeartaigh

Talend Community Coder

  • Unnamed multipart/alternative (inline, None, 0 bytes)
View raw message