First published: Sat Jan 05 2013(Updated: )
Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF | =2.4.5 | |
Apache CXF | =2.4.6 | |
Apache CXF | =2.4.7 | |
Apache CXF | =2.5.1 | |
Apache CXF | =2.5.2 | |
Apache CXF | =2.5.3 | |
Apache CXF | =2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2378 is considered to have a high severity due to its potential exploitation by remote attackers.
CVE-2012-2378 affects Apache CXF versions 2.4.5 to 2.4.7, 2.5.1 to 2.5.3, and 2.6.x before 2.6.1.
To fix CVE-2012-2378, update Apache CXF to version 2.6.1 or higher.
CVE-2012-2378 can be exploited to bypass WS-SecurityPolicy 1.1 policies, which may lead to unauthorized access and data compromise.
There is no official workaround for CVE-2012-2378, and updating to the patched version is strongly recommended.