CVE-2014-0034
Published Jul 7, 2014
Last updated a year ago
Overview
- Description
- The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "228423B2-AA38-4BBE-866D-158F7BBB76E0", "versionEndIncluding": "2.6.11" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4FC7D67-80A3-43F6-8D46-F13F37A017CF" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F069B04-FDA0-41C3-BCAC-C74A310078B7" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EED986C6-39C6-4F2A-86F7-C2CE9BBE25B4" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5CF2CB-B33D-4C51-84C3-8C10E3E26193" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BACD3A8-2FEE-4CB7-9229-06679D6D8150" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0835933D-4EA4-4C95-8964-984087537268" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "070739FD-9411-4BDB-A96F-3BC4A676A40F" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F80936AF-AB6F-4256-85D3-E6E3ADF574E2" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE6234A1-F4E4-44E0-B986-A8964DD52785" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF4FC26A-2767-4E57-BCDA-D55620692202" }, { "criteria": "cpe:2.3:a:apache:cxf:2.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "543E6D15-6C3B-4031-AB2F-2C828281FADA" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D" }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82B6C055-25E2-4C78-ACA7-D722848BDBC4" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C629A8A7-BFB3-453B-9BCA-3873512410FA" }, { "criteria": "cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "346AF04F-E0C5-45EE-A421-2E1A4E2B57FB" }, { "criteria": "cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29777E8F-4DB3-4E9E-9FF4-D13749A7C0AE" }, { "criteria": "cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA20A9DA-2BEB-4699-A8D4-A90EA036693F" }, { "criteria": "cpe:2.3:a:apache:cxf:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "789F6EB3-43A8-4CFA-9A79-31AEDCF22344" }, { "criteria": "cpe:2.3:a:apache:cxf:2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D97E063-EBB9-4676-8C51-0FF4455F3077" }, { "criteria": "cpe:2.3:a:apache:cxf:2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BF1E39F-B945-46B4-BEF0-A26CF04C39E0" }, { "criteria": "cpe:2.3:a:apache:cxf:2.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C508FB9-835A-4240-9F61-21C1D73C00B2" }, { "criteria": "cpe:2.3:a:apache:cxf:2.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1291D3AB-739F-4C5C-AE27-B3A09495E86C" } ], "operator": "OR" } ] } ]