First published: Tue May 16 2017(Updated: )
Apache CXF Fediz ships with an OpenId Connect (OIDC) service which has a Client Registration Service, which is a simple web application that allows clients to be created, deleted, etc. A CSRF (Cross Style Request Forgery) style vulnerability has been found in this web application in Apache CXF Fediz prior to 1.4.0 and 1.3.2, meaning that a malicious web application could create new clients, or reset secrets, etc, after the admin user has logged on to the client registration service and the session is still active.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF Fediz | <=1.3.2 | |
Apache CXF Fediz | =1.4.0 | |
maven/org.apache.cxf.fediz:fediz-oidc | <1.3.2 | 1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7662 is classified as a medium severity vulnerability due to its potential for CSRF attacks.
To fix CVE-2017-7662, upgrade to Apache CXF Fediz version 1.4.0 or above, or ensure you are using version 1.3.2.
CVE-2017-7662 affects versions of Apache CXF Fediz up to 1.3.2 and version 1.4.0.
CVE-2017-7662 is a Cross-Site Request Forgery (CSRF) vulnerability in the Client Registration Service of Apache CXF Fediz.
The potential impacts of CVE-2017-7662 include unauthorized actions being performed on behalf of authenticated users.