Apache CXF prior to 2.5.9, 2.6.x prior to 2.6.6, and 2.7.x prior to 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote malicious users to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache cxf 2.5.2 |
||
apache cxf 2.4.6 |
||
apache cxf 2.5.3 |
||
apache cxf 2.4.0 |
||
apache cxf 2.4.3 |
||
apache cxf 2.5.7 |
||
apache cxf 2.4.4 |
||
apache cxf 2.4.2 |
||
apache cxf 2.5.0 |
||
apache cxf 2.5.1 |
||
apache cxf 2.5.5 |
||
apache cxf |
||
apache cxf 2.4.1 |
||
apache cxf 2.5.6 |
||
apache cxf 2.4.7 |
||
apache cxf 2.4.5 |
||
apache cxf 2.5.4 |
||
apache cxf 2.6.0 |
||
apache cxf 2.6.2 |
||
apache cxf 2.6.5 |
||
apache cxf 2.6.3 |
||
apache cxf 2.6.4 |
||
apache cxf 2.6.1 |
||
apache cxf 2.7.0 |
||
apache cxf 2.7.1 |
||
apache cxf 2.7.2 |