<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2020-13954: Apache CXF Reflected XSS in the services listing page via the styleSheetPath
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Colm O hEigeartaigh <coheigea () apache org>
Date: Thu, 12 Nov 2020 12:37:40 +0000
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Description:
By default, Apache CXF creates a /services page containing a listing of the
available endpoint names and addresses. This webpage is vulnerable to a
reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which
allows a malicious actor to inject javascript into the web page.
This vulnerability affects all versions of Apache CXF prior to 3.4.1 and
3.3.8.
Please note that this is a separate issue to CVE-2019-17573.
Workaround:
Users of Apache CXF should update to either 3.3.8 or 3.4.1. Alternatively,
it is possible to disable the service listing altogether by setting the
"hide-service-list-page" servlet parameter to "true".
Credit:
Thanks to Ryan Lambeth for reporting this issue.
References: http://cxf.apache.org/security-advisories.html
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2020-13954: Apache CXF Reflected XSS in the services listing page via the styleSheetPath Colm O hEigeartaigh (Nov 12)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->