First published: Thu Nov 12 2020(Updated: )
Apache CXF is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the services listing page. A remote attacker could exploit this vulnerability using the styleSheetPath in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF | <3.3.8 | |
Apache CXF | >=3.4.0<3.4.1 | |
NetApp Snap Creator Framework | ||
Netapp Vasa Provider For Clustered Data Ontap | >=9.6 | |
Oracle Business Intelligence | =5.5.0.0.0 | |
Oracle Business Intelligence | =5.9.0.0.0 | |
Oracle Business Intelligence | =12.2.1.3.0 | |
Oracle Business Intelligence | =12.2.1.4.0 | |
Oracle Retail Order Broker Cloud Service | =15.0 | |
Oracle Communications Messaging Server | =8.0.2 | |
Oracle Communications Messaging Server | =8.1 | |
redhat/apache cxf | <3.3.8 | 3.3.8 |
redhat/apache cxf | <3.4.1 | 3.4.1 |
<=10.5 | ||
<=10.6 | ||
<=11.0 | ||
<=11.1 | ||
<=11.2 | ||
<=11.3 | ||
<=11.4 |
Users can disable the service listing altogether by setting the "hide-service-list-page" servlet parameter to "true".
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13954 is a vulnerability in Apache CXF that allows remote attackers to execute script in a victim's web browser through a specially-crafted URL.
CVE-2020-13954 has a severity rating of 6.1 (Medium).
CVE-2020-13954 affects Apache CXF by allowing cross-site scripting attacks through improper validation of user-supplied input on the services listing page.
CVE-2020-13954 affects Apache CXF versions up to and including 3.3.8, and versions up to and including 3.4.1.
To fix CVE-2020-13954, it is recommended to upgrade to Apache CXF version 3.3.9 or 3.4.2 or later.