First published: Tue Nov 14 2017(Updated: )
A flaw was found in Apache CXF prior to 3.2.1 and 3.1.14. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS and JAX-RS services are vulnerable to this attack. Upstream patch: <a href="https://github.com/apache/cxf/commit/8bd915bfd7735c248ad660059c6b6ad26cdbcdf6">https://github.com/apache/cxf/commit/8bd915bfd7735c248ad660059c6b6ad26cdbcdf6</a> References: <a href="http://cxf.apache.org/security-advisories.data/CVE-2017-12624.txt.asc">http://cxf.apache.org/security-advisories.data/CVE-2017-12624.txt.asc</a>
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF | >=3.0.0<3.0.16 | |
Apache CXF | >=3.1.0<3.1.14 | |
Apache CXF | >=3.2.0<3.2.1 | |
maven/org.apache.cxf:cxf-core | <3.0.16 | 3.0.16 |
maven/org.apache.cxf:cxf-core | >=3.1.0<=3.1.13 | 3.1.14 |
maven/org.apache.cxf:cxf-core | =3.2.0 | 3.2.1 |
redhat/cxf | <3.1.14 | 3.1.14 |
redhat/cxf | <3.2.1 | 3.2.1 |
<=10.5 | ||
<=10.6 | ||
<=11.0 | ||
<=11.1 | ||
<=11.2 | ||
<=11.3 | ||
<=11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12624 is a vulnerability in Apache CXF that allows for a denial of service (DoS) attack by using a specially crafted message attachment header.
Apache CXF versions up to and including 3.1.14 and 3.2.1 are affected by CVE-2017-12624.
To fix CVE-2017-12624, upgrade your Apache CXF software to version 3.1.15 or 3.2.2.
CVE-2017-12624 has a severity rating of 5.5, which is considered medium.
You can find more information about CVE-2017-12624 in the Apache CXF security advisories and the Red Hat Bugzilla.