4.3
CVSSv2

CVE-2014-0034

Published: 07/07/2014 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The SecurityTokenService (STS) in Apache CXF prior to 2.6.12 and 2.7.x prior to 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote malicious users to gain access via an invalid SAML token.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache cxf 2.6.8

apache cxf 2.6.0

apache cxf 2.6.2

apache cxf

apache cxf 2.6.9

apache cxf 2.6.5

apache cxf 2.6.10

apache cxf 2.6.6

apache cxf 2.6.3

apache cxf 2.6.4

apache cxf 2.6.1

apache cxf 2.6.7

redhat jboss enterprise application platform 6.0.0

redhat jboss enterprise application platform 6.2.0

apache cxf 2.7.3

apache cxf 2.7.5

apache cxf 2.7.6

apache cxf 2.7.0

apache cxf 2.7.4

apache cxf 2.7.1

apache cxf 2.7.8

apache cxf 2.7.7

apache cxf 2.7.2

Vendor Advisories

It was found that the SecurityTokenService (STS), provided as a part of Apache CXF, could under certain circumstances accept invalid SAML tokens as valid A remote attacker could use a specially crafted SAML token to gain access to an application that uses STS for validation of SAML tokens ...