First published: Tue Apr 18 2017(Updated: )
Apache CXF supports the ability to use XML Signature and encryption to secure JAX-RS services. Two different implementations are available, a DOM based approach that works on a model of the message in memory before applying security, and a streaming based implementation that is a useful alternative for larger messages. There is a bug in validating messages for JAX-RS clients using the streaming approach, where it will not enforce that the message is signed and/or encrypted. An exception is thrown in these cases but not properly propagated to the client code. The bug does not apply for the DOM clients and it does not apply for the streaming server side case. External References: <a href="http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc">http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc</a> Upstream patch: <a href="https://git-wip-us.apache.org/repos/asf?p=cxf.git;a=commit;h=fade9b81dabe27f864ca38e7b40f28fb44d6f165">https://git-wip-us.apache.org/repos/asf?p=cxf.git;a=commit;h=fade9b81dabe27f864ca38e7b40f28fb44d6f165</a>
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cxf | <3.1.11 | 3.1.11 |
redhat/cxf | <3.0.13 | 3.0.13 |
Apache CXF | >=3.0.0<=3.0.13 | |
Apache CXF | >=3.1.0<=3.1.11 | |
maven/org.apache.cxf:cxf-core | <=3.0.12 | 3.0.13 |
maven/org.apache.cxf:cxf-core | >=3.1.0<=3.1.10 | 3.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5653 is classified as a moderate severity vulnerability.
To fix CVE-2017-5653, upgrade Apache CXF to version 3.1.11 or 3.0.13.
CVE-2017-5653 affects Apache CXF versions between 3.0.0 and 3.0.13 as well as between 3.1.0 and 3.1.11.
CVE-2017-5653 impacts JAX-RS services that utilize XML Signature and encryption in Apache CXF.
CVE-2017-5653 is relevant primarily to environments running Apache CXF for web services.