| Title | Apache CXF の SecurityTokenService におけるアクセス権を取得される脆弱性 |
|---|---|
| Summary | Apache CXF の SecurityTokenService (STS) は、キャッシュが有効になっている場合、SAML トークンを適切に検証しないため、アクセス権を取得される脆弱性が存在します。 |
| Possible impacts | 第三者により、不正な SAML トークンを介して、アクセス権を取得される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 26, 2014, midnight |
| Registration Date | July 9, 2014, 2:03 p.m. |
| Last Update | May 8, 2015, 4:41 p.m. |
| CVSS2.0 : 警告 | |
| Score | 4.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:P/I:N/A:N |
| レッドハット |
| JBoss Enterprise Application Platform 6 EL5 |
| JBoss Enterprise Application Platform 6 EL6 |
| JBoss Enterprise Application Platform 6.2 EL5 |
| JBoss Enterprise Application Platform 6.2 EL6 |
| Apache Software Foundation |
| Apache CXF 2.6.12 未満 |
| Apache CXF 2.7.9 未満の 2.7.x |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2014年07月09日] 掲載 [2014年10月30日] ベンダ情報:レッドハット (RHSA-2014:1351) を追加 [2015年05月08日] ベンダ情報:レッドハット (RHSA-2015:0850) を追加 ベンダ情報:レッドハット (RHSA-2015:0851) を追加 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token. |
|---|---|
| Publication Date | July 7, 2014, 11:55 p.m. |
| Registration Date | Jan. 26, 2021, 3:03 p.m. |
| Last Update | Nov. 21, 2024, 11:01 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:apache:cxf:2.6.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:* | 2.6.11 | ||||
| cpe:2.3:a:apache:cxf:2.6.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.6.7:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.0:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.7.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.7.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.7.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.7.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.7.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:* | |||||