Bug 851896 (CVE-2012-3451) - CVE-2012-3451 jbossws-cxf, apache-cxf: SOAPAction spoofing on document literal web services
Summary: CVE-2012-3451 jbossws-cxf, apache-cxf: SOAPAction spoofing on document litera...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-3451
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 858781 858925 858926 858927 873846 915386
Blocks: 851898 881519 917476 917477
TreeView+ depends on / blocked
 
Reported: 2012-08-27 01:25 UTC by David Jorm
Modified: 2023-05-12 22:45 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-04-15 21:30:47 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1591 0 normal SHIPPED_LIVE Important: JBoss Enterprise Application Platform 6.0.1 update 2012-12-19 03:19:29 UTC
Red Hat Product Errata RHSA-2012:1592 0 normal SHIPPED_LIVE Important: JBoss Enterprise Application Platform 6.0.1 update 2012-12-19 03:31:01 UTC
Red Hat Product Errata RHSA-2012:1594 0 normal SHIPPED_LIVE Important: JBoss Enterprise Application Platform 6.0.1 update 2012-12-19 03:52:56 UTC
Red Hat Product Errata RHSA-2013:0256 0 normal SHIPPED_LIVE Important: JBoss Enterprise Application Platform 5.2.0 security update 2013-02-13 23:50:39 UTC
Red Hat Product Errata RHSA-2013:0257 0 normal SHIPPED_LIVE Important: JBoss Enterprise Application Platform 5.2.0 security update 2013-02-14 00:01:01 UTC
Red Hat Product Errata RHSA-2013:0258 0 normal SHIPPED_LIVE Important: JBoss Enterprise Web Platform 5.2.0 security update 2013-02-14 00:00:56 UTC
Red Hat Product Errata RHSA-2013:0259 0 normal SHIPPED_LIVE Important: JBoss Enterprise Web Platform 5.2.0 security update 2013-02-14 00:00:47 UTC
Red Hat Product Errata RHSA-2013:0726 0 normal SHIPPED_LIVE Important: JBoss Enterprise SOA Platform 5.3.1 update 2013-04-09 22:11:58 UTC
Red Hat Product Errata RHSA-2013:0743 0 normal SHIPPED_LIVE Important: JBoss Enterprise BRMS Platform 5.3.1 update 2013-04-15 21:51:34 UTC

Description David Jorm 2012-08-27 01:25:06 UTC
Apache CXF is vulnerable to SOAPAction spoofing attacks under certain conditions. If web services are exposed via Apache CXF that use a unique SOAPAction for each service operation, then a remote attacker could perform SOAPAction spoofing to call a forbidden operation if it accepts the same parameters as an allowed operation. WS-Policy validation is performed against the operation being invoked, and an attack must pass validation to be successful.

Comment 2 Jan Lieskovsky 2012-09-19 16:38:35 UTC
This is now public via upstream advisory:
[1] http://cxf.apache.org/cve-2012-3451.html

Relevant upstream patch:
[2] http://svn.apache.org/viewvc?view=revision&revision=1368559

Comment 3 Jan Lieskovsky 2012-09-19 16:42:15 UTC
This issue affects the version of the jbossws-cxf package, as shipped with Fedora release of 17. Please schedule an update.

Comment 4 Jan Lieskovsky 2012-09-19 16:43:01 UTC
Created jbossws-cxf tracking bugs for this issue

Affects: fedora-17 [bug 858781]

Comment 8 Murray McAllister 2012-10-11 04:10:42 UTC
Acknowledgements:

Red Hat would like to thank the Apache CXF project for reporting this issue.

Comment 9 errata-xmlrpc 2012-12-18 22:21:49 UTC
This issue has been addressed in following products:

  JBEAP 6 for RHEL 5

Via RHSA-2012:1591 https://rhn.redhat.com/errata/RHSA-2012-1591.html

Comment 10 errata-xmlrpc 2012-12-18 22:33:37 UTC
This issue has been addressed in following products:

  JBEAP 6 for RHEL 6

Via RHSA-2012:1592 https://rhn.redhat.com/errata/RHSA-2012-1592.html

Comment 11 errata-xmlrpc 2012-12-18 22:53:32 UTC
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 6.0.1

Via RHSA-2012:1594 https://rhn.redhat.com/errata/RHSA-2012-1594.html

Comment 12 errata-xmlrpc 2013-02-13 18:52:01 UTC
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 5.2.0

Via RHSA-2013:0256 https://rhn.redhat.com/errata/RHSA-2013-0256.html

Comment 13 errata-xmlrpc 2013-02-13 19:02:41 UTC
This issue has been addressed in following products:

  JBEWP 5 for RHEL 4
  JBEWP 5 for RHEL 5
  JBEWP 5 for RHEL 6

Via RHSA-2013:0259 https://rhn.redhat.com/errata/RHSA-2013-0259.html

Comment 14 errata-xmlrpc 2013-02-13 19:02:48 UTC
This issue has been addressed in following products:

  JBoss Enterprise Web Platform 5.2.0

Via RHSA-2013:0258 https://rhn.redhat.com/errata/RHSA-2013-0258.html

Comment 15 errata-xmlrpc 2013-02-13 19:03:23 UTC
This issue has been addressed in following products:

  JBEAP 5 for RHEL 4
  JBEAP 5 for RHEL 5
  JBEAP 5 for RHEL 6

Via RHSA-2013:0257 https://rhn.redhat.com/errata/RHSA-2013-0257.html

Comment 16 errata-xmlrpc 2013-04-09 18:19:09 UTC
This issue has been addressed in following products:

  JBoss Enterprise SOA Platform 5.3.1

Via RHSA-2013:0726 https://rhn.redhat.com/errata/RHSA-2013-0726.html

Comment 17 errata-xmlrpc 2013-04-15 17:51:52 UTC
This issue has been addressed in following products:

  JBoss Enterprise BRMS Platform 5.3.1

Via RHSA-2013:0743 https://rhn.redhat.com/errata/RHSA-2013-0743.html


Note You need to log in before you can comment on or make changes to this bug.