cve-2013-0239
Vulnerability from cvelistv5
Published
2013-03-12 22:00
Modified
2024-08-06 14:18
Severity ?
EPSS score ?
Summary
Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "90078", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/90078" }, { "name": "51988", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51988" }, { "name": "20130208 New security advisories for Apache CXF", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2013/Feb/39" }, { "name": "apachecxf-username-tokens-sec-bypass(81981)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81981" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://cxf.apache.org/cve-2013-0239.html" }, { "name": "57876", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/57876" }, { "name": "RHSA-2013:0749", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0749.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1438424" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html" }, { "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T11:06:16", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "90078", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/90078" }, { "name": "51988", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51988" }, { "name": "20130208 New security advisories for Apache CXF", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2013/Feb/39" }, { "name": "apachecxf-username-tokens-sec-bypass(81981)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81981" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://cxf.apache.org/cve-2013-0239.html" }, { "name": "57876", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/57876" }, { "name": "RHSA-2013:0749", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0749.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1438424" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html" }, { "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E" }, { "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0239", "datePublished": "2013-03-12T22:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-0239\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-03-12T23:55:01.690\",\"lastModified\":\"2023-02-13T04:39:57.610\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element.\"},{\"lang\":\"es\",\"value\":\"Apache CXF anterior a v2.5.9, v2.6.x anterior a v2.6.6, y v2.7.x anterior a v2.7.3, cuando est\u00e1 activado sernameToken WS-SecurityPolicy en texto plano, permite a atacantes remotos evitar la autenticaci\u00f3n a trav\u00e9s de una cabecera de seguridad de una petici\u00f3n SOAP que contiene un elemento UsernameToken que carece de contrase\u00f1a en el elemento hijo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.5.8\",\"matchCriteriaId\":\"15691F9A-39D8-4228-83CF-96E98018012D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"617F940F-8B29-447D-BB6D-A1F4A151D87A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E1EE45D-2FAF-4FEE-9FD6-DBD695C9A6A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BB8072-24DC-490A-9DCB-A4B6A694541C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19233D8E-661D-454C-8504-77228B2249BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97DFFE5-8E06-4A59-9971-8FCF2B969025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD8E746D-8FEF-47AB-97DC-8A0C1743F7D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BFB2300-841A-4D92-96C7-D58E15F67D8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6468310-155B-4582-9DA8-90C6B99E02BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24246B2-915D-494B-9863-CF0B662BE54D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6915B2EC-AA31-44B5-A5F3-3EE1FDD0ABC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90280778-F7D6-49E2-9C7F-9F5F58137FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962F2A85-4731-450B-986B-E1A79986F143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49F920D4-1102-4D30-ABD8-F47342DA735A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84FD5387-E292-458A-9E8C-85C082461594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D523A5E-24A7-43D7-AE54-02EBF13537D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC774B3E-D7E4-4FC1-AB09-392EC16F0F76\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4FC7D67-80A3-43F6-8D46-F13F37A017CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F069B04-FDA0-41C3-BCAC-C74A310078B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED986C6-39C6-4F2A-86F7-C2CE9BBE25B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5CF2CB-B33D-4C51-84C3-8C10E3E26193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BACD3A8-2FEE-4CB7-9229-06679D6D8150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0835933D-4EA4-4C95-8964-984087537268\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C629A8A7-BFB3-453B-9BCA-3873512410FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"346AF04F-E0C5-45EE-A421-2E1A4E2B57FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29777E8F-4DB3-4E9E-9FF4-D13749A7C0AE\"}]}]}],\"references\":[{\"url\":\"http://cxf.apache.org/cve-2013-0239.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/90078\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0749.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2013/Feb/39\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51988\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1438424\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/57876\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/81981\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.