CVE-2016-4464

Published on: 09/21/2016 12:00:00 AM UTC

Last Modified on: 04/02/2021 12:15:00 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Cxf Fediz from Apache contain the following vulnerability:

The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature.

  • CVE-2016-4464 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
Apache CXF Fediz SAML AudienceRestriction Access Control Flaw Lets Remote Authenticated Users Access a Different Service on the Target System - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036869
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
oss-security - New security advisory for Apache CXF Fediz - CVE-2016-4464 Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160908 New security advisory for Apache CXF Fediz - CVE-2016-4464
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html
Malformed Request cve.report (archive)
text/html
URL Logo BID 92905
Mitigation
Vendor Advisory
cxf.apache.org
text/plain
CONFIRM cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc
ASF Git Repos - cxf-fediz.git/commit Issue Tracking
Patch
git-wip-us.apache.org
text/xml
URL Logo CONFIRM git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=0006581e9cacbeef46381a223e5671e524d416b6

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheCxf Fediz1.2.0AllAllAll
ApplicationApacheCxf Fediz1.2.1AllAllAll
ApplicationApacheCxf Fediz1.2.2AllAllAll
ApplicationApacheCxf Fediz1.3.0AllAllAll
ApplicationApacheCxf Fediz1.2.0AllAllAll
ApplicationApacheCxf Fediz1.2.1AllAllAll
ApplicationApacheCxf Fediz1.2.2AllAllAll
ApplicationApacheCxf Fediz1.3.0AllAllAll
  • cpe:2.3:a:apache:cxf_fediz:1.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf_fediz:1.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf_fediz:1.2.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf_fediz:1.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf_fediz:1.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf_fediz:1.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf_fediz:1.2.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf_fediz:1.3.0:*:*:*:*:*:*:*: