Total vulnerabilities in the database
Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element.
Software | From | Fixed in |
---|---|---|
apache / cxf | 2.5.2 | 2.5.2.x |
apache / cxf | 2.4.6 | 2.4.6.x |
apache / cxf | 2.5.3 | 2.5.3.x |
apache / cxf | 2.4.0 | 2.4.0.x |
apache / cxf | 2.4.3 | 2.4.3.x |
apache / cxf | 2.5.7 | 2.5.7.x |
apache / cxf | 2.4.4 | 2.4.4.x |
apache / cxf | 2.4.2 | 2.4.2.x |
apache / cxf | 2.5.0 | 2.5.0.x |
apache / cxf | 2.5.1 | 2.5.1.x |
apache / cxf | 2.5.5 | 2.5.5.x |
apache / cxf | - | 2.5.8.x |
apache / cxf | 2.4.1 | 2.4.1.x |
apache / cxf | 2.5.6 | 2.5.6.x |
apache / cxf | 2.4.7 | 2.4.7.x |
apache / cxf | 2.4.5 | 2.4.5.x |
apache / cxf | 2.5.4 | 2.5.4.x |
apache / cxf | 2.6.0 | 2.6.0.x |
apache / cxf | 2.6.2 | 2.6.2.x |
apache / cxf | 2.6.5 | 2.6.5.x |
apache / cxf | 2.6.3 | 2.6.3.x |
apache / cxf | 2.6.4 | 2.6.4.x |
apache / cxf | 2.6.1 | 2.6.1.x |
apache / cxf | 2.7.0 | 2.7.0.x |
apache / cxf | 2.7.1 | 2.7.1.x |
apache / cxf | 2.7.2 | 2.7.2.x |
![]() |
- | 2.5.9 |
![]() |
2.6.0 | 2.6.6 |
![]() |
2.7.0 | 2.7.3 |