6 results (0.007 seconds)

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 1

Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters. Las versiones de Apache CXF Fediz anteriores a la 1.4.4 no deshabilitan completamente las Document Type Declarations (DTDs) al analizar la respuesta Identity Provider en los plugins de la aplicación o en el propio Identity Provider al analizar ciertos parámetros basados en XML. • https://github.com/tafamace/CVE-2018-8038 http://cxf.apache.org/security-advisories.data/CVE-2018-8038.txt.asc http://www.securitytracker.com/id/1041220 https://github.com/apache/cxf-fediz/commit/b6ed9865d0614332fa419fe4b6d0fe81bc2e660d https://lists.apache.org/thread.html/f0a6a05ec3b3a00458da43712b0ff3a2f573175d9bfb39fb0de21424%40%3Cdev.cxf.apache.org%3E https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb07 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3 and Spring 4 plugins in versions before 1.4.3 and 1.3.3. The vulnerability can result in a security context that is set up using a malicious client's roles for the given enduser. Apache CXF Fediz se envía con un número de plugins específicos del contenedor para habilitar WS-Federation para aplicaciones. Se ha encontrado una vulnerabilidad de estilo CSRF (Cross Style Request Forgery) en los plugins Spring 2, Spring 3 y Spring 4 en versiones anteriores a la 1.4.3 y la 1.3.3. • http://cxf.547215.n5.nabble.com/Apache-CXF-Fediz-1-4-3-and-1-3-3-released-with-a-new-security-advisory-CVE-2017-12631-td5785868.html http://www.securityfocus.com/bid/102127 http://www.securitytracker.com/id/1040487 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 0

Application plugins in Apache CXF Fediz before 1.1.3 and 1.2.x before 1.2.1 allow remote attackers to cause a denial of service. Plugins de aplicaciones en Apache CXF Fediz, versiones anteriores a la 1.1.3 y de la 1.2.x a la 1.2.1 permiten a atacantes remotos causar una denegación de servicio. • http://www.openwall.com/lists/oss-security/2015/08/26/3 http://www.securityfocus.com/bid/76486 https://cxf.apache.org/security-advisories.data/CVE-2015-5175.txt.asc?version=1&modificationDate=1440598018000&api=v2 https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git%3Ba=commit%3Bh=f65c961ea31e3c1851daba8e7e49fc37bbf77b19 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3, Jetty 8 and Jetty 9 plugins in Apache CXF Fediz prior to 1.4.0, 1.3.2 and 1.2.4. Apache CXF Fediz, se envía con una serie de plugins específicos de contenedores para habilitar WS-Federation para aplicaciones. Una vulnerabilidad de estilo CSRF (Cross Style Request Forgery) se ha detectado en los plugins Spring 2, Spring 3, Jetty 8 y Jetty 9 en Apache CXF Fediz anteriores a versiones 1.4.0, 1.3.2 y 1.2.4. • http://cxf.apache.org/security-advisories.data/CVE-2017-7661.txt.asc http://www.securitytracker.com/id/1038497 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Apache CXF Fediz ships with an OpenId Connect (OIDC) service which has a Client Registration Service, which is a simple web application that allows clients to be created, deleted, etc. A CSRF (Cross Style Request Forgery) style vulnerability has been found in this web application in Apache CXF Fediz prior to 1.4.0 and 1.3.2, meaning that a malicious web application could create new clients, or reset secrets, etc, after the admin user has logged on to the client registration service and the session is still active. Apache CXF Fediz, se envía con un servicio OpenId Connect (OIDC) que presenta un servicio de registro de clientes, que es una aplicación web sencilla que permite a los clientes ser creados, eliminados, etc. Una vulnerabilidad de estilo CSRF (Cross Style Request Forgery) se ha detectado en esta aplicación web en Apache CXF Fediz anterior a versiones 1.4.0 y 1.3.2, quiere decir que una aplicación web maliciosa podría crear nuevos clientes, o restablecer secretos, etc., después de que el usuario administrador haya iniciado sesión en el servicio de registro de cliente y la sesión este todavía activa. • http://cxf.apache.org/security-advisories.data/CVE-2017-7662.txt.asc http://www.securitytracker.com/id/1038498 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d • CWE-352: Cross-Site Request Forgery (CSRF) •