CVE-2014-3623
CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.
Apache WSS4J anterior a versión 1.6.17 y versiones 2.x anteriores a 2.0.2, tal y como es usado en Apache CXF versiones 2.7.x anteriores a 2.7.13 y versiones 3.0.x anteriores a 3.0.2, cuando se usa TransportBinding, no se impone apropiadamente la semántica de seguridad del método SubjectConfirmation de SAML, que permite a los atacantes remotos conducir ataques de suplantación de identidad por medio de vectores no especificados.
It was found that Apache WSS4J (Web Services Security for Java), as used by Apache CXF with the TransportBinding, did not, by default, properly enforce all security requirements associated with SAML SubjectConfirmation methods. A remote attacker could use this flaw to perform various types of spoofing attacks on web service endpoints secured by WSS4J that rely on SAML for authentication.
Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications. This patch is an update to Red Hat JBoss Fuse 6.1.0 and Red Hat JBoss A-MQ 6.1.0. It includes bug fixes, which are documented in the readme.txt file included with the patch files. The following security issues are addressed in this release: It was found that Apache WSS4J, as used by Apache CXF with the TransportBinding, did not, by default, properly enforce all security requirements associated with SAML SubjectConfirmation methods. A remote attacker could use this flaw to perform various types of spoofing attacks on web service endpoints secured by WSS4J that rely on SAML for authentication.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-05-14 CVE Reserved
- 2014-10-30 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
- CWE-347: Improper Verification of Cryptographic Signature
CAPEC
References (17)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2015-0236.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-0675.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-0850.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-0851.html | 2023-11-07 | |
https://issues.apache.org/jira/browse/WSS-511 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2014-3623 | 2015-04-16 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1157304 | 2015-04-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Wss4j Search vendor "Apache" for product "Wss4j" | < 1.6.17 Search vendor "Apache" for product "Wss4j" and version " < 1.6.17" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Wss4j Search vendor "Apache" for product "Wss4j" | >= 2.0.0 < 2.0.2 Search vendor "Apache" for product "Wss4j" and version " >= 2.0.0 < 2.0.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Cxf Search vendor "Apache" for product "Cxf" | >= 2.7.0 <= 2.7.13 Search vendor "Apache" for product "Cxf" and version " >= 2.7.0 <= 2.7.13" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Cxf Search vendor "Apache" for product "Cxf" | >= 3.0.0 < 3.0.2 Search vendor "Apache" for product "Cxf" and version " >= 3.0.0 < 3.0.2" | - |
Affected
|