Search for packages
| purl | pkg:maven/org.apache.cxf/cxf@3.3.10 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3tb8-jrjz-b7fw
Aliases: CVE-2022-46364 GHSA-x3x3-qwjq-8gj4 |
Apache CXF Server-Side Request Forgery vulnerability A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-qjqy-9ypz-8bgz
Aliases: CVE-2022-46363 GHSA-3w37-5p3p-jv92 |
Apache CXF vulnerable to Exposure of Sensitive Information A vulnerability in Apache CXF before versions 3.5.5 and 3.4.10 allows an attacker to perform a remote directory listing or code exfiltration. The vulnerability only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, and so the vulnerability can only arise if the CXF service is misconfigured. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-tujp-5vda-b3c5 | Authorization service vulnerable to DDos attacks in Apache CFX CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10. |
CVE-2021-22696
GHSA-7q4h-pj78-j7vg |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2025-08-01T13:37:43.092347+00:00 | GHSA Importer | Fixing | VCID-tujp-5vda-b3c5 | https://github.com/advisories/GHSA-7q4h-pj78-j7vg | 37.0.0 |
| 2025-08-01T10:56:15.993227+00:00 | GitLab Importer | Affected by | VCID-qjqy-9ypz-8bgz | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46363.yml | 37.0.0 |
| 2025-08-01T10:56:06.601564+00:00 | GitLab Importer | Affected by | VCID-3tb8-jrjz-b7fw | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46364.yml | 37.0.0 |
| 2025-08-01T09:51:18.279098+00:00 | GitLab Importer | Fixing | VCID-tujp-5vda-b3c5 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2021-22696.yml | 37.0.0 |
| 2025-07-31T08:53:16.119575+00:00 | GithubOSV Importer | Fixing | VCID-tujp-5vda-b3c5 | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-7q4h-pj78-j7vg/GHSA-7q4h-pj78-j7vg.json | 37.0.0 |