Page 8 of 37 results (0.006 seconds)

CVSS: 9.8EPSS: 3%CPEs: 2EXPL: 0

The WS-SP UsernameToken policy in Apache CXF 2.4.5 and 2.5.1 allows remote attackers to bypass authentication by sending an empty UsernameToken as part of a SOAP request. La política WS-SP UsernameToken en Apache CXF 2.4.5 y 2.5.1 permite que atacantes remotos eludan la autenticación mediante el envío de un UsernameToken vacío como parte de una petición SOAP. • http://marc.info/?l=full-disclosure&m=132861746008002 http://svn.apache.org/viewvc?view=revision&revision=1233457 https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 3%CPEs: 3EXPL: 1

Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to samples/wsdl_first_pure_xml, a similar issue to CVE-2010-1632. Apache CXF v2.0.x anterior a v2.0.13, v2.1.x anterior a v2.1.10, y v2.2.x anterior a v2.2.9, utilizado en Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, y otros productos, no rechaza correctamente DTDs en los mensajes SOAP, lo que permite a atacantes remotos leer ficheros de su elección, enviar peticiones HTTP al servidor de la intranet, o provocar una denegación de servicio (consumo de CPU y memoria) a través de un DTD manipulado, como se ha demostrado por una declaración de la entidad en una petición a samples/wsdl_first_pure_xml, un caso similar a CVE-2010-1632. • http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html http://geronimo.apache.org/21x-security-report.html http://geronimo.apache.org/22x-security-report.html http://secunia.com/advisories/40969 http://secunia.com/advisories/41016 http://secunia.com/advisories/41025 http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf http://www.listware.net/201006/cxf-users/60160-important-apache-cxf-security-advisory-cve-2010-2076.html http://www.securityfocus.c • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •