First published: Mon Aug 27 2012(Updated: )
Apache CXF is vulnerable to SOAPAction spoofing attacks under certain conditions. If web services are exposed via Apache CXF that use a unique SOAPAction for each service operation, then a remote attacker could perform SOAPAction spoofing to call a forbidden operation if it accepts the same parameters as an allowed operation. WS-Policy validation is performed against the operation being invoked, and an attack must pass validation to be successful.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF | <2.4.9 | |
Apache CXF | >=2.5.0<2.5.5 | |
Apache CXF | >=2.6.0<2.6.2 | |
maven/org.apache.cxf:cxf | >=2.6.0<2.6.2 | 2.6.2 |
maven/org.apache.cxf:cxf | >=2.5.0<2.5.5 | 2.5.5 |
maven/org.apache.cxf:cxf | <2.4.9 | 2.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.