First published: Wed Sep 21 2016(Updated: )
The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF Fediz | =1.2.0 | |
Apache CXF Fediz | =1.2.1 | |
Apache CXF Fediz | =1.2.2 | |
Apache CXF Fediz | =1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4464 is rated as a medium severity vulnerability.
To fix CVE-2016-4464, upgrade to Apache CXF Fediz version 1.2.3 or 1.3.1 or later.
CVE-2016-4464 affects Apache CXF Fediz versions 1.2.0 through 1.2.2 and 1.3.0.
CVE-2016-4464 allows remote attackers to bypass audience restrictions via crafted SAML tokens.
There are no known workarounds for CVE-2016-4464; updating is recommended.