
We found results for “”
CVE-2017-3156
Good to know:


Date: August 10, 2017
The OAuth2 Hawk and JOSE MAC Validation code in Apache CXF prior to 3.0.13 and 3.1.x prior to 3.1.10 is not using a constant time MAC signature comparison algorithm which may be exploited by sophisticated timing attacks.
Language: Java
Severity Score
Related Resources (20)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf.services.sts:cxf-services-sts-war:3.1.6;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-jose:3.1.10;org.apache.cxf:cxf-rt-rs-security-jose:3.0.13;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.0.13;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.0.13;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.0.13;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.0.13;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.0.13;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.0.13;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10;org.apache.cxf:cxf-rt-rs-security-oauth2:3.1.10
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |