Описание
SSRF vulnerability using the Aegis DataBinding in Apache CXF
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-28752
- https://github.com/apache/cxf/commit/d0baeb3ee64c6d7c883bd2f5c4cb0de6b0b5f463
- https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt
- https://security.netapp.com/advisory/ntap-20240517-0001
- http://www.openwall.com/lists/oss-security/2024/03/14/3
Пакеты
org.apache.cxf:cxf-rt-databinding-aegis
< 3.5.8
3.5.8
org.apache.cxf:cxf-rt-databinding-aegis
>= 3.6.0, < 3.6.3
3.6.3
org.apache.cxf:cxf-rt-databinding-aegis
>= 4.0.0, < 4.0.4
4.0.4
Связанные уязвимости
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.
Уязвимость каркаса для веб-сервисов Apache CXF, существующая из-за недостаточной проверки вводимых пользователем данных, позволяющая нарушителю осуществить SSRF-атаку