First published: Fri May 02 2014(Updated: )
The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF | <=2.6.11 | |
Apache CXF | =2.6.0 | |
Apache CXF | =2.6.1 | |
Apache CXF | =2.6.2 | |
Apache CXF | =2.6.3 | |
Apache CXF | =2.6.4 | |
Apache CXF | =2.6.5 | |
Apache CXF | =2.6.6 | |
Apache CXF | =2.6.7 | |
Apache CXF | =2.6.8 | |
Apache CXF | =2.6.9 | |
Apache CXF | =2.6.10 | |
Redhat Jboss Enterprise Application Platform | =6.0.0 | |
Redhat Jboss Enterprise Application Platform | =6.2.0 | |
Apache CXF | =2.7.0 | |
Apache CXF | =2.7.1 | |
Apache CXF | =2.7.2 | |
Apache CXF | =2.7.3 | |
Apache CXF | =2.7.4 | |
Apache CXF | =2.7.5 | |
Apache CXF | =2.7.6 | |
Apache CXF | =2.7.7 | |
Apache CXF | =2.7.8 | |
maven/org.apache.cxf:cxf-rt-ws-security | >=2.7.0<2.7.9 | 2.7.9 |
maven/org.apache.cxf:cxf-rt-ws-security | <2.6.12 | 2.6.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.