QID 980352

QID 980352: Java (maven) Security Update for org.apache.cxf:apache-cxf (GHSA-7q4h-pj78-j7vg)

CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.

Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to refer to GHSA-7q4h-pj78-j7vg for updates pertaining to this vulnerability.
    Vendor References

    CVEs related to QID 980352

    Software Advisories
    Advisory ID Software Component Link
    GHSA-7q4h-pj78-j7vg org.apache.cxf:apache-cxf URL Logo github.com/advisories/GHSA-7q4h-pj78-j7vg
    GHSA-7q4h-pj78-j7vg org.apache.cxf:cxf URL Logo github.com/advisories/GHSA-7q4h-pj78-j7vg