漏洞信息详情
Apache CXF 跨站脚本漏洞
漏洞简介
Apache CXF是美国阿帕奇(Apache)基金会的一个开源的Web服务框架。该框架支持多种Web服务标准、多种前端编程API等。
Apache CXF 3.4.1版本和3.3.8之前所有版本存在跨站脚本漏洞,该漏洞源于Apache CXF创建一个服务页面,其中包含可用端点名称和地址的列表。此网页容易受到通过styleSheetPath反射的跨站点脚本攻击(XSS)的攻击,攻击者可利用该漏洞将javascript注入web页面。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2
参考网址
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2020/11/12/2
来源:MLIST
链接:https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20210513-0010/
来源:MISC
链接:http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2
来源:MLIST
链接:https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2021.html
来源:MLIST
链接:https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuApr2021.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-13954
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-apache-cxf-vulnerability-identified-in-ibm-tivoli-application-dependency-discovery-manager-cve-2020-13954/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-has-been-identified-in-apache-cxf-which-is-a-required-product-for-ibm-tivoli-network-manager-ip-edition-cve-2020-13954/
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuapr2021.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2731
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Oracle-Communications-vulnerabilities-of-April-2021-35123
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2525
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021042320
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-10/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/6520472
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163798/Red-Hat-Security-Advisory-2021-3140-01.html
受影响实体
暂无
补丁
- Apache CXF 跨站脚本漏洞的修复措施<!--2020-11-12-->
还没有评论,来说两句吧...