Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-22696

Опубликовано: 02 апр. 2021
Источник: redhat
CVSS3: 7.5

Описание

CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Red Hat BPM Suite 6cxf-coreNot affected
Red Hat Decision Manager 7cxf-coreNot affected
Red Hat Integration Camel K 1cxf-coreAffected
Red Hat Integration Camel Quarkus 1cxf-coreWill not fix
Red Hat JBoss BRMS 6cxfNot affected
Red Hat JBoss Data Virtualization 6cxf-coreOut of support scope
Red Hat JBoss Enterprise Application Platform 7cxf-coreNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packcxf-coreNot affected
Red Hat JBoss Fuse 6cxf-coreOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1946341cxf: OAuth 2 authorization service vulnerable to DDos attacks

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
почти 5 лет назад

CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.

CVSS3: 7.5
github
больше 4 лет назад

Authorization service vulnerable to DDos attacks in Apache CFX

7.5 High

CVSS3