blob: fade674d81631a17784ba676ccc3a385fa1beb21 [file] [log] [blame]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
CVE-2015-5175: Apache CXF Fediz application plugins are vulnerable to Denial of Service (DoS) attacks
Severity: Major
Vendor: The Apache Software Foundation
Versions Affected:
This vulnerability affects all versions of Apache CXF Fediz prior to 1.2.1 and
1.1.3.
Description:
Apache CXF Fediz is a subproject of Apache CXF which implements the
WS-Federation Passive Requestor Profile for SSO specification. It provides a
number of container based plugins to enable SSO for Relying Party applications.
These plugins are potentially vulnerable to DoS attacks due to the fact that
support for Document Type Declarations (DTDs) is not disabled when parsing
the response from the Identity Provider (IdP).
This has been fixed in revision:
https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=f65c961ea31e3c1851daba8e7e49fc37bbf77b19
Migration:
Fediz 1.1.x users should upgrade to 1.1.3 or later as soon as possible.
Fediz 1.2.x users should upgrade to 1.2.1 or later as soon as possible.
References: http://cxf.apache.org/security-advisories.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJV3IHcAAoJEGe/gLEK1TmDFSEH/04dyMI4uZPOMc/xI1D/4Jf2
GmtJFzkEDeNVGEUBx3nZW8PwO6zuQ1n7puQpWNNXLyiBY3SRb1rl56WgflgXoJCA
Ma302BWP3ONVKfTZepwuzIXCLw8WfsXK9yjZKbP38PrURoZJNlgO/KFC4YCK5L+F
oe09JIpv3412HMGt5RxJQ2c0szBoMEQzQEFpETex9IMCNuLvFmLTRFjGUpYMiFvh
v/OaOIjUwADJEQyAQlJ0Vr0OROKaApB/nsqnGn1MViRW5qOzJdA0wTi9ic0lZt7F
OKnptVKFwaICKiNKO/QRkESmbXyxQCrkiXp5urjog7/c0cFzCLeBtNlJ1v+0swI=
=uJn7
-----END PGP SIGNATURE-----