5 results (0.014 seconds)

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 1

Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters. Las versiones de Apache CXF Fediz anteriores a la 1.4.4 no deshabilitan completamente las Document Type Declarations (DTDs) al analizar la respuesta Identity Provider en los plugins de la aplicación o en el propio Identity Provider al analizar ciertos parámetros basados en XML. • https://github.com/tafamace/CVE-2018-8038 http://cxf.apache.org/security-advisories.data/CVE-2018-8038.txt.asc http://www.securitytracker.com/id/1041220 https://github.com/apache/cxf-fediz/commit/b6ed9865d0614332fa419fe4b6d0fe81bc2e660d https://lists.apache.org/thread.html/f0a6a05ec3b3a00458da43712b0ff3a2f573175d9bfb39fb0de21424%40%3Cdev.cxf.apache.org%3E https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb07 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3 and Spring 4 plugins in versions before 1.4.3 and 1.3.3. The vulnerability can result in a security context that is set up using a malicious client's roles for the given enduser. Apache CXF Fediz se envía con un número de plugins específicos del contenedor para habilitar WS-Federation para aplicaciones. Se ha encontrado una vulnerabilidad de estilo CSRF (Cross Style Request Forgery) en los plugins Spring 2, Spring 3 y Spring 4 en versiones anteriores a la 1.4.3 y la 1.3.3. • http://cxf.547215.n5.nabble.com/Apache-CXF-Fediz-1-4-3-and-1-3-3-released-with-a-new-security-advisory-CVE-2017-12631-td5785868.html http://www.securityfocus.com/bid/102127 http://www.securitytracker.com/id/1040487 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Apache CXF Fediz ships with an OpenId Connect (OIDC) service which has a Client Registration Service, which is a simple web application that allows clients to be created, deleted, etc. A CSRF (Cross Style Request Forgery) style vulnerability has been found in this web application in Apache CXF Fediz prior to 1.4.0 and 1.3.2, meaning that a malicious web application could create new clients, or reset secrets, etc, after the admin user has logged on to the client registration service and the session is still active. Apache CXF Fediz, se envía con un servicio OpenId Connect (OIDC) que presenta un servicio de registro de clientes, que es una aplicación web sencilla que permite a los clientes ser creados, eliminados, etc. Una vulnerabilidad de estilo CSRF (Cross Style Request Forgery) se ha detectado en esta aplicación web en Apache CXF Fediz anterior a versiones 1.4.0 y 1.3.2, quiere decir que una aplicación web maliciosa podría crear nuevos clientes, o restablecer secretos, etc., después de que el usuario administrador haya iniciado sesión en el servicio de registro de cliente y la sesión este todavía activa. • http://cxf.apache.org/security-advisories.data/CVE-2017-7662.txt.asc http://www.securitytracker.com/id/1038498 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3, Jetty 8 and Jetty 9 plugins in Apache CXF Fediz prior to 1.4.0, 1.3.2 and 1.2.4. Apache CXF Fediz, se envía con una serie de plugins específicos de contenedores para habilitar WS-Federation para aplicaciones. Una vulnerabilidad de estilo CSRF (Cross Style Request Forgery) se ha detectado en los plugins Spring 2, Spring 3, Jetty 8 y Jetty 9 en Apache CXF Fediz anteriores a versiones 1.4.0, 1.3.2 y 1.2.4. • http://cxf.apache.org/security-advisories.data/CVE-2017-7661.txt.asc http://www.securitytracker.com/id/1038497 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 2%CPEs: 4EXPL: 0

The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature. Los plugins de aplicación en Apache CXF Fediz 1.2.x en versiones anteriores a 1.2.3 y 1.3.x en versiones anteriores a 1.3.1 no coinciden con valores SAML AudienceRestriction contra URls de audiencias configuradas, lo que podría permitir a atacantes remotos eludir restricciones intencionadas y tener otro impacto no especificado a través de un token SAML manipulado con una firma confiable. • http://cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc http://www.openwall.com/lists/oss-security/2016/09/08/20 http://www.securityfocus.com/bid/92905 http://www.securitytracker.com/id/1036869 https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git%3Ba=commit%3Bh=0006581e9cacbeef46381a223e5671e524d416b6 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0 • CWE-284: Improper Access Control •