Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1445329 - (CVE-2017-5656) CVE-2017-5656 cxf: CXF's STSClient uses a flawed way of caching tokens that are associated with delegation tokens
CVE-2017-5656 cxf: CXF's STSClient uses a flawed way of caching tokens that a...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170405,repor...
: Security
Depends On: 1445335
Blocks: 1445347
  Show dependency treegraph
 
Reported: 2017-04-25 09:44 EDT by Andrej Nemec
Modified: 2018-10-19 17:40 EDT (History)
75 users (show)

See Also:
Fixed In Version: cxf 3.1.11, cxf 3.0.13
Doc Type: If docs needed, set a value
Doc Text:
It was found that the token cacher in Apache cxf uses a flawed way of caching tokens that are associated with the delegation token received from Security Token Service (STS). This vulnerability could allow an attacker to craft a token which could return an identifier corresponding to a cached token for another user.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1832 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse/A-MQ 6.3 R4 security and bug fix update 2017-08-15 01:47:49 EDT
Red Hat Product Errata RHSA-2018:1694 None None None 2018-05-22 12:53 EDT

  None (edit)
Description Andrej Nemec 2017-04-25 09:44:28 EDT
An Apache CXF endpoint can be used as an intermediary, where a token credential
from the received message is used as a delegation token to obtain a new token
from a Security Token Service (STS) for the outbound request.

By default, the token retrieved from the STS is cached and associated with the
delegation token via an identifier extracted from the delegation token. 

However, there is a weakness in how the identifier is extracted from the
delegation token, which means that an attacker could craft a token which 
would return an identifer corresponding to a cached token for another user.

External References:

http://cxf.apache.org/security-advisories.data/CVE-2017-5656.txt.asc

Upstream patch:

https://github.com/apache/cxf/commit/66c2c5b99e01a2165a2c5ed9ae34b4b9a512cb39
Comment 1 Andrej Nemec 2017-04-25 09:46:48 EDT
Created cxf tracking bugs for this issue:

Affects: fedora-all [bug 1445335]
Comment 5 errata-xmlrpc 2017-08-10 19:05:11 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse

Via RHSA-2017:1832 https://access.redhat.com/errata/RHSA-2017:1832
Comment 7 Jason Shepherd 2017-12-04 19:42:41 EST
cxf-rt-ws-security-3.1.12.redhat-1 in EAP 7.1.0 is not affected.
Comment 12 errata-xmlrpc 2018-05-22 12:52:40 EDT
This issue has been addressed in the following products:

  Red Hat Openshift Application Runtimes

Via RHSA-2018:1694 https://access.redhat.com/errata/RHSA-2018:1694

Note You need to log in before you can comment on or make changes to this bug.