ID CVE-2014-3584
Summary The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:cxf:2.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 16-06-2021 - 12:15)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 70738
confirm http://cxf.apache.org/security-advisories.data/CVE-2014-3584.txt.asc
mlist
  • [cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
  • [cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
  • [cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html
  • [cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html
  • [oss-security] 20141024 New security advisories released for Apache CXF
secunia 61909
xf apache-cxf-cve20143584-dos(97753)
Last major update 16-06-2021 - 12:15
Published 30-10-2014 - 14:55
Last modified 16-06-2021 - 12:15
Back to Top