logo

CVE-2015-0226 org.apache.ws.security:wss4j

Package

Manager: maven
Name: org.apache.ws.security:wss4j
Vulnerable Version: >=0 <1.6.17

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.04622 pctl0.88854

Details

Use of a Broken or Risky Cryptographic Algorithm in Apache WSS4J Apache WSS4J before 1.6.17 and 2.0.x before 2.0.2 improperly leaks information about decryption failures when decrypting an encrypted key or message data, which makes it easier for remote attackers to recover the plaintext form of a symmetric key via a series of crafted messages. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-2487.

Metadata

Created: 2022-05-14T00:55:57Z
Modified: 2025-02-19T21:13:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vjwc-5hfh-2vv5/GHSA-vjwc-5hfh-2vv5.json
CWE IDs: ["CWE-327"]
Alternative ID: GHSA-vjwc-5hfh-2vv5
Finding: F052
Auto approve: 1