CVE-2016-6812

Published on: 08/10/2017 12:00:00 AM UTC

Last Modified on: 04/02/2021 12:15:00 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Certain versions of Cxf from Apache contain the following vulnerability:

The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.

  • CVE-2016-6812 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.
  • Affected Vendor/Software: URL Logo Apache Software Foundation - Apache CXF version prior to 3.0.12
  • Affected Vendor/Software: URL Logo Apache Software Foundation - Apache CXF version 3.1.x prior to 3.1.9

CVSS3 Score: 6.1 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED LOW LOW NONE

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
[CXF-6216] No output sanitizing in FormattedServiceListWriter - ASF JIRA Issue Tracking
Vendor Advisory
issues.apache.org
text/html
URL Logo CONFIRM issues.apache.org/jira/browse/CXF-6216
Apache CXF CVE-2016-6812 Cross Site Scripting Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 97582
Patch
Vendor Advisory
cxf.apache.org
text/plain
URL Logo CONFIRM cxf.apache.org/security-advisories.data/CVE-2016-6812.txt.asc
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2017:0868
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html
Apache CXF Input Validation Flaw in FormattedServiceListWriter() Lets Remote Users Conduct Cross-Site Scripting Attacks - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1037543

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheCxf3.1.0AllAllAll
ApplicationApacheCxf3.1.1AllAllAll
ApplicationApacheCxf3.1.2AllAllAll
ApplicationApacheCxf3.1.3AllAllAll
ApplicationApacheCxf3.1.4AllAllAll
ApplicationApacheCxf3.1.5AllAllAll
ApplicationApacheCxf3.1.6AllAllAll
ApplicationApacheCxf3.1.7AllAllAll
ApplicationApacheCxf3.1.8AllAllAll
ApplicationApacheCxf3.1.0AllAllAll
ApplicationApacheCxf3.1.1AllAllAll
ApplicationApacheCxf3.1.2AllAllAll
ApplicationApacheCxf3.1.3AllAllAll
ApplicationApacheCxf3.1.4AllAllAll
ApplicationApacheCxf3.1.5AllAllAll
ApplicationApacheCxf3.1.6AllAllAll
ApplicationApacheCxf3.1.7AllAllAll
ApplicationApacheCxf3.1.8AllAllAll
ApplicationApacheCxfAllAllAllAll
  • cpe:2.3:a:apache:cxf:3.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:3.1.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*: