First published: Tue Apr 18 2017(Updated: )
Apache CXF supports the ability to use XML Signature and encryption to secure JAX-RS services. Two different implementations are available, a DOM based approach that works on a model of the message in memory before applying security, and a streaming based implementation that is a useful alternative for larger messages. There is a bug in validating messages for JAX-RS clients using the streaming approach, where it will not enforce that the message is signed and/or encrypted. An exception is thrown in these cases but not properly propagated to the client code. The bug does not apply for the DOM clients and it does not apply for the streaming server side case. External References: <a href="http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc">http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc</a> Upstream patch: <a href="https://git-wip-us.apache.org/repos/asf?p=cxf.git;a=commit;h=fade9b81dabe27f864ca38e7b40f28fb44d6f165">https://git-wip-us.apache.org/repos/asf?p=cxf.git;a=commit;h=fade9b81dabe27f864ca38e7b40f28fb44d6f165</a>
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cxf | <3.1.11 | 3.1.11 |
redhat/cxf | <3.0.13 | 3.0.13 |
Apache CXF | >=3.0.0<=3.0.13 | |
Apache CXF | >=3.1.0<=3.1.11 | |
maven/org.apache.cxf:cxf-core | <=3.0.12 | 3.0.13 |
maven/org.apache.cxf:cxf-core | >=3.1.0<=3.1.10 | 3.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.