

This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This issue affects Apache CXF versions prior to 3.4.3 Apache CXF versions prior to 3.3.10.īy default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. This issue affects Apache CXF versions prior to 3.4.4 Apache CXF versions prior to 3.3.11.ĬXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). If you want to see a complete summary for this CPE, please contact us.Ī vulnerability in the JsonMapObjectReaderWriter of Apache CXF allows an attacker to submit malformed JSON to a web service, which results in the thread getting stuck in an infinite loop, consuming CPU indefinitely.
