CVE-2021-22696: Apache CXF: OAuth 2 authorization service vulnerable to DDos attacks

Related Vulnerabilities: CVE-2021-22696  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2021-22696: Apache CXF: OAuth 2 authorization service vulnerable to DDos attacks

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: Colm O hEigeartaigh &lt;coheigea () apache org&gt;

Date: Fri, 2 Apr 2021 10:47:26 +0100

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Description:

CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a
JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization
Framework: JWT Secured Authorization Request (JAR)). Instead of sending a
JWT token as a "request" parameter, the spec also supports specifying a URI
from which to retrieve a JWT token from via the "request_uri" parameter.

CXF was not validating the "request_uri" parameter (apart from ensuring it
uses "https) and was making a REST request to the parameter in the request
to retrieve a token.

This means that CXF was vulnerable to DDos attacks on the authorization
server, as specified in section 10.4.1 of the spec.

This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions
prior to 3.3.10.

Reference:
http://cxf.apache.org/security-advisories.data/CVE-2021-22696.txt.asc

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

CVE-2021-22696: Apache CXF: OAuth 2 authorization service vulnerable to DDos attacks Colm O hEigeartaigh (Apr 02)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->