First published: Thu Jul 18 2024(Updated: )
A SSRF vulnerability in WADL service description in versions of Apache CXF before 4.0.5, 3.6.4 and 3.5.9 allows an attacker to perform SSRF style attacks on REST webservices. The attack only applies if a custom stylesheet parameter is configured.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.cxf:cxf-rt-rs-service-description | <3.5.9 | 3.5.9 |
maven/org.apache.cxf:cxf-rt-rs-service-description | >=3.6.0<3.6.4 | 3.6.4 |
maven/org.apache.cxf:cxf-rt-rs-service-description | >=4.0.0<4.0.5 | 4.0.5 |
Apache CXF | <3.5.9 | |
Apache CXF | >=3.6.0<3.6.4 | |
Apache CXF | >=4.0.0<4.0.5 | |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29736 is classified as a high-severity SSRF vulnerability affecting specific versions of Apache CXF.
To fix CVE-2024-29736, upgrade Apache CXF to at least version 3.5.9, 3.6.4, or 4.0.5.
CVE-2024-29736 affects Apache CXF versions prior to 3.5.9, 3.6.4, and 4.0.5.
CVE-2024-29736 allows attackers to execute Server-Side Request Forgery (SSRF) attacks on REST web services.
Yes, CVE-2024-29736 can only be exploited if a custom stylesheet parameter is configured.