First published: Fri Jul 19 2024(Updated: )
A SSRF vulnerability in WADL service description in versions of Apache CXF before 4.0.5, 3.6.4 and 3.5.9 allows an attacker to perform SSRF style attacks on REST webservices. The attack only applies if a custom stylesheet parameter is configured.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF | <4.0.5 | |
Apache CXF |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2298827 is categorized as high due to the potential for SSRF attacks on REST web services.
To fix REDHAT-BUG-2298827, upgrade Apache CXF to version 4.0.5 or later, or to version 3.6.4 or 3.5.9.
Apache CXF versions prior to 4.0.5, 3.6.4, and 3.5.9 are affected by REDHAT-BUG-2298827.
SSRF style attacks, relevant to REDHAT-BUG-2298827, allow attackers to make requests to internal resources from a vulnerable server.
Yes, a custom stylesheet parameter must be configured for the REDHAT-BUG-2298827 vulnerability to be exploitable.