First published: Fri Jul 19 2024(Updated: )
An improper input validation of the p2c parameter in the Apache CXF JOSE code before 4.0.5, 3.6.4 and 3.5.9 allows an attacker to perform a denial of service attack by specifying a large value for this parameter in a token.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF | <4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2298828 is significant as it allows denial of service attacks through improper input validation.
To fix REDHAT-BUG-2298828, upgrade Apache CXF to version 4.0.5 or later, or to 3.6.4 or later, or to 3.5.9 or later.
Versions of Apache CXF affected by REDHAT-BUG-2298828 are those prior to 4.0.5, 3.6.4, and 3.5.9.
REDAHT-BUG-2298828 enables attackers to perform denial of service attacks.
Yes, improper input validation of the p2c parameter is a critical issue in REDHAT-BUG-2298828.