<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2021-22696: Apache CXF: OAuth 2 authorization service vulnerable to DDos attacks
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Colm O hEigeartaigh <coheigea () apache org>
Date: Fri, 2 Apr 2021 10:47:26 +0100
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Description:
CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a
JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization
Framework: JWT Secured Authorization Request (JAR)). Instead of sending a
JWT token as a "request" parameter, the spec also supports specifying a URI
from which to retrieve a JWT token from via the "request_uri" parameter.
CXF was not validating the "request_uri" parameter (apart from ensuring it
uses "https) and was making a REST request to the parameter in the request
to retrieve a token.
This means that CXF was vulnerable to DDos attacks on the authorization
server, as specified in section 10.4.1 of the spec.
This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions
prior to 3.3.10.
Reference:
http://cxf.apache.org/security-advisories.data/CVE-2021-22696.txt.asc
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2021-22696: Apache CXF: OAuth 2 authorization service vulnerable to DDos attacks Colm O hEigeartaigh (Apr 02)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->