CVE-2016-6812
Published on: 08/10/2017 12:00:00 AM UTC
Last Modified on: 04/02/2021 12:15:00 PM UTC
Certain versions of Cxf from Apache contain the following vulnerability:
The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.
- CVE-2016-6812 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Apache Software Foundation - Apache CXF version prior to 3.0.12
- Affected Vendor/Software:
Apache Software Foundation - Apache CXF version 3.1.x prior to 3.1.9
CVSS3 Score: 6.1 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
NETWORK | LOW | NONE | REQUIRED | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
CHANGED | LOW | LOW | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Apache | Cxf | 3.1.0 | All | All | All |
Application | Apache | Cxf | 3.1.1 | All | All | All |
Application | Apache | Cxf | 3.1.2 | All | All | All |
Application | Apache | Cxf | 3.1.3 | All | All | All |
Application | Apache | Cxf | 3.1.4 | All | All | All |
Application | Apache | Cxf | 3.1.5 | All | All | All |
Application | Apache | Cxf | 3.1.6 | All | All | All |
Application | Apache | Cxf | 3.1.7 | All | All | All |
Application | Apache | Cxf | 3.1.8 | All | All | All |
Application | Apache | Cxf | 3.1.0 | All | All | All |
Application | Apache | Cxf | 3.1.1 | All | All | All |
Application | Apache | Cxf | 3.1.2 | All | All | All |
Application | Apache | Cxf | 3.1.3 | All | All | All |
Application | Apache | Cxf | 3.1.4 | All | All | All |
Application | Apache | Cxf | 3.1.5 | All | All | All |
Application | Apache | Cxf | 3.1.6 | All | All | All |
Application | Apache | Cxf | 3.1.7 | All | All | All |
Application | Apache | Cxf | 3.1.8 | All | All | All |
Application | Apache | Cxf | All | All | All | All |
- cpe:2.3:a:apache:cxf:3.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.1:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.3:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.4:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.5:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.6:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.7:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.8:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.1:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.3:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.4:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.5:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.6:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.7:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:3.1.8:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE