Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 905722 - (CVE-2013-0239) CVE-2013-0239 jbossws-cxf, apache-cxf: UsernameTokenPolicyValidator and UsernameTokenInterceptor allow empty passwords to authenticate
CVE-2013-0239 jbossws-cxf, apache-cxf: UsernameTokenPolicyValidator and Usern...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20130208,repo...
: Security
Depends On: 896347 901329 909247 909248 910936 910943
Blocks: 905724
  Show dependency treegraph
 
Reported: 2013-01-29 21:37 EST by David Jorm
Modified: 2014-10-20 20:04 EDT (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-04-16 15:14:46 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0644 normal SHIPPED_LIVE Important: apache-cxf security update 2013-03-13 18:49:09 EDT
Red Hat Product Errata RHSA-2013:0645 normal SHIPPED_LIVE Important: apache-cxf security update 2013-03-13 18:49:02 EDT
Red Hat Product Errata RHSA-2013:0649 normal SHIPPED_LIVE Important: Fuse ESB Enterprise 7.1.0 update 2013-03-14 16:48:11 EDT
Red Hat Product Errata RHSA-2013:0749 normal SHIPPED_LIVE Important: apache-cxf security update 2013-04-16 18:53:46 EDT

  None (edit)
Description David Jorm 2013-01-29 21:37:22 EST
It was found that the Apache CXF UsernameTokenPolicyValidator and UsernameTokenInterceptor allow a UsernameToken element with no password child element to bypass authentication. A remote attacker could use this flaw to circumvent access controls applied to web services by omitting the password in a UsernameToken. If an incorrect password is provided, authentication will fail, but if the password is omitted, it will succeed. This flaw is exploitable on web services that rely on WS-SecurityPolicy plaintext UsernameTokens to authenticate users. It is not exploitable when using hashed passwords or WS-Security without WS-SecurityPolicy.
Comment 1 David Jorm 2013-01-29 21:49:54 EST
Upstream bug for Apache CXF:

https://issues.apache.org/jira/browse/CXF-4776

Upstream trunk patch commit:

http://svn.apache.org/viewvc?view=revision&revision=1438424
Comment 2 Jan Lieskovsky 2013-02-08 08:59:22 EST
Upstream advisory: http://cxf.apache.org/cve-2013-0239.html
Comment 4 Jan Lieskovsky 2013-02-08 09:06:44 EST
Created cxf tracking bugs for this issue

Affects: fedora-all [bug 909247]
Comment 9 errata-xmlrpc 2013-03-13 14:49:45 EDT
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 6.0.1

Via RHSA-2013:0645 https://rhn.redhat.com/errata/RHSA-2013-0645.html
Comment 10 errata-xmlrpc 2013-03-13 14:50:03 EDT
This issue has been addressed in following products:

  JBEAP 6 for RHEL 5
  JBEAP 6 for RHEL 6

Via RHSA-2013:0644 https://rhn.redhat.com/errata/RHSA-2013-0644.html
Comment 11 errata-xmlrpc 2013-03-14 12:49:09 EDT
This issue has been addressed in following products:

  Fuse ESB Enterprise 7.1.0 Patch 3

Via RHSA-2013:0649 https://rhn.redhat.com/errata/RHSA-2013-0649.html
Comment 12 errata-xmlrpc 2013-04-16 14:54:14 EDT
This issue has been addressed in following products:

  JBoss Portal Platform 6.0.0

Via RHSA-2013:0749 https://rhn.redhat.com/errata/RHSA-2013-0749.html

Note You need to log in before you can comment on or make changes to this bug.