First published: Thu Jul 18 2024(Updated: )
An improper input validation of the p2c parameter in the Apache CXF JOSE code before 4.0.5, 3.6.4 and 3.5.9 allows an attacker to perform a denial of service attack by specifying a large value for this parameter in a token.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.cxf:cxf-rt-rs-security-jose | <3.5.9 | 3.5.9 |
maven/org.apache.cxf:cxf-rt-rs-security-jose | >=3.6.0<3.6.4 | 3.6.4 |
maven/org.apache.cxf:cxf-rt-rs-security-jose | >=4.0.0<4.0.5 | 4.0.5 |
Apache CXF | <3.5.9 | |
Apache CXF | >=3.6.0<3.6.4 | |
Apache CXF | >=4.0.0<4.0.5 | |
<3.5.9 | ||
>=3.6.0<3.6.4 | ||
>=4.0.0<4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.