First published: Fri May 02 2014(Updated: )
The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.cxf:cxf-rt-ws-security | >=2.7.0<2.7.9 | 2.7.9 |
maven/org.apache.cxf:cxf-rt-ws-security | <2.6.12 | 2.6.12 |
redhat/cxf | <2.6.14 | 2.6.14 |
redhat/cxf | <2.7.11 | 2.7.11 |
Apache CXF | <=2.6.11 | |
Apache CXF | =2.6.0 | |
Apache CXF | =2.6.1 | |
Apache CXF | =2.6.2 | |
Apache CXF | =2.6.3 | |
Apache CXF | =2.6.4 | |
Apache CXF | =2.6.5 | |
Apache CXF | =2.6.6 | |
Apache CXF | =2.6.7 | |
Apache CXF | =2.6.8 | |
Apache CXF | =2.6.9 | |
Apache CXF | =2.6.10 | |
JBoss Enterprise Application Platform | =6.0.0 | |
JBoss Enterprise Application Platform | =6.2.0 | |
Apache CXF | =2.7.0 | |
Apache CXF | =2.7.1 | |
Apache CXF | =2.7.2 | |
Apache CXF | =2.7.3 | |
Apache CXF | =2.7.4 | |
Apache CXF | =2.7.5 | |
Apache CXF | =2.7.6 | |
Apache CXF | =2.7.7 | |
Apache CXF | =2.7.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0034 has been classified as a high severity vulnerability due to improper validation of SAML tokens.
To fix CVE-2014-0034, upgrade your Apache CXF installation to version 2.6.12 or later, or 2.7.9 or later.
CVE-2014-0034 affects Apache CXF versions prior to 2.6.12 and 2.7.x prior to 2.7.9.
Yes, CVE-2014-0034 can allow remote attackers to gain unauthorized access through invalid SAML tokens.
Review the configuration of the SecurityTokenService (STS) for proper token validation when caching is enabled to mitigate CVE-2014-0034.