logo

CVE-2016-4464 org.apache.cxf.fediz:fediz-spring

Package

Manager: maven
Name: org.apache.cxf.fediz:fediz-spring
Vulnerable Version: >=1.2.0 <1.2.3 || =1.3.0 || >=1.3.0 <1.3.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.02058 pctl0.83206

Details

High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz:fediz-spring2 The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature.

Metadata

Created: 2018-10-18T16:57:10Z
Modified: 2020-06-16T21:52:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-qpwj-mvv7-v3m9/GHSA-qpwj-mvv7-v3m9.json
CWE IDs: ["CWE-284"]
Alternative ID: GHSA-qpwj-mvv7-v3m9
Finding: F039
Auto approve: 1