Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7q4h-pj78-j7vg

Опубликовано: 13 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Authorization service vulnerable to DDos attacks in Apache CFX

CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.

Пакеты

Наименование

org.apache.cxf:cxf

maven
Затронутые версииВерсия исправления

>= 3.4.0, < 3.4.3

3.4.3

Наименование

org.apache.cxf:cxf

maven
Затронутые версииВерсия исправления

< 3.3.10

3.3.10

Наименование

org.apache.cxf:apache-cxf

maven
Затронутые версииВерсия исправления

>= 3.4.0, < 3.4.3

3.4.3

Наименование

org.apache.cxf:apache-cxf

maven
Затронутые версииВерсия исправления

< 3.3.10

3.3.10

EPSS

Процентиль: 83%
0.01971
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-918

Связанные уязвимости

CVSS3: 7.5
redhat
почти 5 лет назад

CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.

CVSS3: 7.5
nvd
почти 5 лет назад

CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.

EPSS

Процентиль: 83%
0.01971
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-918