First published: Thu Mar 14 2024(Updated: )
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.cxf:cxf-core | >=4.0.0<4.0.4 | 4.0.4 |
maven/org.apache.cxf:cxf-core | >=3.6.0<3.6.3 | 3.6.3 |
maven/org.apache.cxf:cxf-core | <3.5.8 | 3.5.8 |
redhat/cxf-core | <3.5.8 | 3.5.8 |
redhat/cxf-core | <3.6.3 | 3.6.3 |
redhat/cxf-core | <4.0.4 | 4.0.4 |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP9 IF03 | |
IBM QRadar Incident Forensics | <=7.5 - 7.5.0 UP9 IF03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28752 is classified as a high-severity SSRF vulnerability affecting certain versions of Apache CXF.
To fix CVE-2024-28752, upgrade Apache CXF to version 4.0.4, 3.6.3, or 3.5.8 or later.
CVE-2024-28752 affects versions of Apache CXF prior to 4.0.4, 3.6.3, and 3.5.8.
CVE-2024-28752 enables Server Side Request Forgery (SSRF) attacks on web services.
Yes, IBM's QRadar SIEM and QRadar Incident Forensics are also impacted by CVE-2024-28752.