blob: 4bd6e3767b68b43022273b6580dde705e0d426ca [file] [log] [blame]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
CVE-2017-3156: Apache CXF OAuth2 Hawk and JOSE MAC Validation code is vulnerable to the timing attacks
Severity: Major
Vendor: The Apache Software Foundation
Versions Affected:
This vulnerability affects all versions of Apache CXF prior to 3.0.13, 3.1.10.
Description:
Apache CXF OAuth2 Hawk and JOSE MAC Validation code is not using a constant time MAC signature
comparison algorithm which may be exploited by some sophisticated timing attacks. It may only affect
OAuth2 Hawk or JWT access tokens or JOSE JWS/JWE interceptors which depend on HMac secret key algorithms.
This has been fixed in revisions:
CXF 3.1.x:
http://git-wip-us.apache.org/repos/asf/cxf/commit/555843f9
CXF 3.0.x
http://git-wip-us.apache.org/repos/asf/cxf/commit/1338469f
CXF 3.2.0-SNAPSHOT (master):
http://git-wip-us.apache.org/repos/asf/cxf/commit/e66ce235
Credit:
The issue was reported and the patch provided by Richard Kettelerij.
Migration:
CXF 3.0.x users should upgrade to 3.0.13 or later as soon as possible.
CXF 3.1.x users should upgrade to 3.1.10 or later as soon as possible.
References: http://cxf.apache.org/security-advisories.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAliq0rIACgkQmcduTd7eq5LohQCgkIiSd26xoIzt/+Pi0r8ri0HD
bbQAn3C5Y8DNes7QGRUP6Dv1hVRrmP2y
=0YqU
-----END PGP SIGNATURE-----