Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-3451

Опубликовано: 19 сент. 2012
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss BRMS 5SecurityAffected
Red Hat JBoss SOA Platform 5SecurityAffected
JBEWP 5 for RHEL 5apache-cxfFixedRHSA-2013:025913.02.2013
JBEWP 5 for RHEL 6apache-cxfFixedRHSA-2013:025913.02.2013
JBoss Enterprise BRMS Platform 5.3FixedRHSA-2013:074315.04.2013
Red Hat JBoss Enterprise Application Platform 5.2FixedRHSA-2013:025613.02.2013
Red Hat JBoss Enterprise Application Platform 5 for RHEL 4apache-cxfFixedRHSA-2013:025713.02.2013
Red Hat JBoss Enterprise Application Platform 5 for RHEL 5apache-cxfFixedRHSA-2013:025713.02.2013
Red Hat JBoss Enterprise Application Platform 5 for RHEL 6apache-cxfFixedRHSA-2013:025713.02.2013
Red Hat JBoss Enterprise Application Platform 6.0FixedRHSA-2012:159418.12.2012

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=851896apache-cxf: SOAPAction spoofing on document literal web services

EPSS

Процентиль: 93%
0.09969
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.

github
больше 3 лет назад

Remote web-service operation execution in Apache CXF

EPSS

Процентиль: 93%
0.09969
Низкий

4.3 Medium

CVSS2

Уязвимость CVE-2012-3451