Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g4px-6qhm-hqjm

Опубликовано: 08 авг. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.3

Описание

Apache CXF: Untrusted JMS configuration can lead to RCE

If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility.

Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.

Пакеты

Наименование

org.apache.cxf:cxf-rt-transports-jms

maven
Затронутые версииВерсия исправления

< 3.6.8

3.6.8

Наименование

org.apache.cxf:cxf-rt-transports-jms

maven
Затронутые версииВерсия исправления

>= 4.0.0, < 4.0.9

4.0.9

Наименование

org.apache.cxf:cxf-rt-transports-jms

maven
Затронутые версииВерсия исправления

>= 4.1.0, < 4.1.3

4.1.3

EPSS

Процентиль: 28%
0.00097
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8.3
redhat
9 дней назад

If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.

CVSS3: 9.8
nvd
9 дней назад

If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.

EPSS

Процентиль: 28%
0.00097
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-20