CVE-2017-12624
cxf: Improper size validation in message attachment header for JAX-WS and JAX-RS services
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS and JAX-RS services are vulnerable to this attack. From Apache CXF 3.2.1 and 3.1.14, message attachment headers that are greater than 300 characters will be rejected by default. This value is configurable via the property "attachment-max-header-size".
Apache CXF es compatible con el envío y la recepción de archivos adjuntos mediante las especificaciones JAX-WS o JAX-RS. Es posible manipular una cabecera de adjunto de mensaje que podría conducir a un ataque de denegación de servicio (DoS) en un proveedor de servicios web de CXF. Tanto los servicios JAX-WS como JAX-RS son vulnerables a este ataque. Desde las versiones 3.2.1 y 3.1.14 de Apache CXF, la cabeceras de adjunto de mensaje de más de 300 caracteres se rechazarán por defecto. Este valor puede configurarse mediante la propiedad "attachment-max-header-size".
Red Hat Single Sign-On 7.2 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.2.4 serves as a replacement for Red Hat Single Sign-On 7.2.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include denial of service and traversal vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-08-07 CVE Reserved
- 2017-11-14 CVE Published
- 2018-11-19 First Exploit
- 2024-09-17 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (16)
URL | Date | SRC |
---|---|---|
https://github.com/tafamace/CVE-2017-12624 | 2018-11-19 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://cxf.apache.org/security-advisories.data/CVE-2017-12624.txt.asc | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2018:2423 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2018:2424 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2018:2425 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2018:2428 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2017-12624 | 2018-08-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1515976 | 2018-08-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Cxf Search vendor "Apache" for product "Cxf" | >= 3.0.0 < 3.0.16 Search vendor "Apache" for product "Cxf" and version " >= 3.0.0 < 3.0.16" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Cxf Search vendor "Apache" for product "Cxf" | >= 3.1.0 < 3.1.14 Search vendor "Apache" for product "Cxf" and version " >= 3.1.0 < 3.1.14" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Cxf Search vendor "Apache" for product "Cxf" | >= 3.2.0 < 3.2.1 Search vendor "Apache" for product "Cxf" and version " >= 3.2.0 < 3.2.1" | - |
Affected
|