FKIE_CVE-2025-48795
Vulnerability from fkie_nvd - Published: 2025-07-15 15:15 - Updated: 2025-11-04 22:16
Severity ?
Summary
Apache CXF stores large stream based messages as temporary files on the local filesystem. A bug was introduced which means that the entire temporary file is read into memory and then logged. An attacker might be able to exploit this to cause a denial of service attack by causing an out of memory exception. In addition, it is possible to configure CXF to encrypt temporary files to prevent sensitive credentials from being cached unencrypted on the local filesystem, however this bug means that the cached files are written out to logs unencrypted.
Users are recommended to upgrade to versions 3.5.11, 3.6.6, 4.0.7 or 4.1.1, which fixes this issue.
References
| URL | Tags | ||
|---|---|---|---|
| security@apache.org | https://lists.apache.org/thread/vo5qv02mvv5plmb6z2xf1ktjmrpv3jmn | Issue Tracking, Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/07/15/3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:cxf:3.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7F973DA8-6DEF-4CFC-9E6C-C0CB0CAA8037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:cxf:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B4C64A03-4077-4DC5-9287-0ADE3F86D637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:cxf:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "40B91243-304F-425A-BE97-133AC2C4A7C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:cxf:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DF72B7F5-406B-419D-8276-7699F540E4CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache CXF stores large stream based messages as temporary files on the local filesystem. A bug was introduced which means that the entire temporary file is read into memory and then logged. An attacker might be able to exploit this to cause a denial of service attack by causing an out of memory exception. In addition, it is possible to configure CXF to encrypt temporary files to prevent sensitive credentials from being cached unencrypted on the local filesystem, however this bug means that the cached files are written out to logs unencrypted.\n\nUsers are recommended to upgrade to versions 3.5.11, 3.6.6, 4.0.7 or 4.1.1, which fixes this issue."
},
{
"lang": "es",
"value": "Apache CXF almacena mensajes grandes basados en flujos como archivos temporales en el sistema de archivos local. Se introdujo un error que provoca que el archivo temporal completo se lea en memoria y luego se registre. Un atacante podr\u00eda aprovechar esto para provocar un ataque de denegaci\u00f3n de servicio mediante una excepci\u00f3n de memoria insuficiente. Adem\u00e1s, es posible configurar CXF para cifrar archivos temporales y evitar que las credenciales confidenciales se almacenen en cach\u00e9 sin cifrar en el sistema de archivos local. Sin embargo, este error implica que los archivos en cach\u00e9 se escriben en los registros sin cifrar. Se recomienda actualizar a las versiones 3.5.11, 3.6.6, 4.0.7 o 4.1.1, que solucionan este problema."
}
],
"id": "CVE-2025-48795",
"lastModified": "2025-11-04T22:16:17.490",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-07-15T15:15:24.697",
"references": [
{
"source": "security@apache.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread/vo5qv02mvv5plmb6z2xf1ktjmrpv3jmn"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/07/15/3"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "security@apache.org",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…