Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-3156

Опубликовано: 20 фев. 2017
Источник: redhat
CVSS3: 5.3
EPSS Средний

Описание

The OAuth2 Hawk and JOSE MAC Validation code in Apache CXF prior to 3.0.13 and 3.1.x prior to 3.1.10 is not using a constant time MAC signature comparison algorithm which may be exploited by sophisticated timing attacks.

It was found that Apache CXF OAuth2 Hawk and JOSE MAC Validation code is not using a constant time MAC signature comparison algorithm which may be exploited by some sophisticated timing attacks. It may only affect OAuth2 Hawk or JWT access tokens or JOSE JWS/JWE interceptors which depend on HMAC secret key algorithms.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6cxfNot affected
Red Hat JBoss BRMS 5cxfNot affected
Red Hat JBoss BRMS 6cxfNot affected
Red Hat JBoss Data Grid 6cxfOut of support scope
Red Hat JBoss Data Virtualization 6cxfNot affected
Red Hat JBoss Enterprise Application Platform 5cxfOut of support scope
Red Hat JBoss Enterprise Application Platform 6cxfOut of support scope
Red Hat JBoss Enterprise Application Platform 7cxfNot affected
Red Hat JBoss Fuse Service Works 6.0.0cxfNot affected
Red Hat JBoss Operations Network 3cxfOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=1425455cxf: CXF OAuth2 Hawk and JOSE MAC Validation code are vulnerable to timing attacks

EPSS

Процентиль: 94%
0.1307
Средний

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 8 лет назад

The OAuth2 Hawk and JOSE MAC Validation code in Apache CXF prior to 3.0.13 and 3.1.x prior to 3.1.10 is not using a constant time MAC signature comparison algorithm which may be exploited by sophisticated timing attacks.

CVSS3: 7.5
github
больше 3 лет назад

Covert Timing Channel in Apache CXF

EPSS

Процентиль: 94%
0.1307
Средний

5.3 Medium

CVSS3