First published: Mon Aug 27 2012(Updated: )
Apache CXF is vulnerable to SOAPAction spoofing attacks under certain conditions. If web services are exposed via Apache CXF that use a unique SOAPAction for each service operation, then a remote attacker could perform SOAPAction spoofing to call a forbidden operation if it accepts the same parameters as an allowed operation. WS-Policy validation is performed against the operation being invoked, and an attack must pass validation to be successful.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CXF |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-851896 is considered medium due to the potential for unauthorized access to web service operations.
To fix REDHAT-BUG-851896, ensure that your web service does not allow arbitrary SOAPAction values by properly configuring the CXF service.
Web services that use Apache CXF and have a unique SOAPAction for each operation are affected by REDHAT-BUG-851896.
The potential risks include a remote attacker being able to exploit SOAPAction spoofing to execute unauthorized operations.
A workaround for REDHAT-BUG-851896 is to validate and restrict SOAPAction headers in your web service implementation.