CVE-2017-5653
Spoofing vulnerability in cxf-core (Maven)
What is CVE-2017-5653 About?
This vulnerability affects Apache CXF JAX-RS XML Security streaming clients, where they fail to validate the signature or encryption of service responses. This omission allows remote attackers to spoof servers by sending unvalidated responses. Exploitation requires the attacker to be in a position to intercept or manipulate network traffic, and is of moderate difficulty.
Affected Software
- org.apache.cxf:cxf-core
- >3.1.0, <3.1.11
- <3.0.13
Technical Details
The vulnerability exists in Apache CXF's JAX-RS XML Security streaming clients. These clients are designed to handle XML-based security mechanisms, including signing and encryption, for messages exchanged with services. However, the flaw is that the client-side implementation does not enforce validation of whether an incoming service response was actually signed or encrypted as expected. An attacker positioned between the client and the legitimate server, or able to intercept client-server communications, can craft and send a malicious, unsigned or unencrypted response. Because the client fails to validate the security properties of the response, it will process the attacker's fabricated message as if it originated from the legitimate server, leading to server spoofing.
What is the Impact of CVE-2017-5653?
Successful exploitation may allow attackers to spoof legitimate servers, leading to unauthorized information disclosure, execution of unauthorized actions, or delivery of malicious content to unsuspecting clients.
What is the Exploitability of CVE-2017-5653?
Exploitation of this vulnerability generally requires an attacker to be in a man-in-the-middle position or have the ability to intercept and modify network traffic between the client and the server. No authentication is required on the client side to accept the spoofed response, but the attacker needs network access to the communication channel. The complexity involves crafting a malicious, unsigned or unencrypted response that the client expects to be secured. There are no specific privilege requirements for the attacker beyond network access. The absence of server response validation is the key facilitator for this vulnerability, increasing the likelihood if network interception is possible.
What are the Known Public Exploits?
| PoC Author | Link | Commentary |
|---|---|---|
| No known exploits | ||
What are the Available Fixes for CVE-2017-5653?
About the Fix from Resolved Security
This patch fixes CVE-2017-5653 by ensuring that the XML security interceptor properly handles entity body processing when acting as a JAX-RS ReaderInterceptor, and only processes relevant HTTP methods (excluding GET requests on the server). Previously, the interceptor could be bypassed or invoked incorrectly, allowing malicious unsigned or unencrypted XML messages to be processed; the patch ensures cryptographic enforcement at the appropriate lifecycle stage, thus mitigating the vulnerability.
Available Upgrade Options
- org.apache.cxf:cxf-core
- <3.0.13 → Upgrade to 3.0.13
- org.apache.cxf:cxf-core
- >3.1.0, <3.1.11 → Upgrade to 3.1.11
Struggling with dependency upgrades?
See how Resolved Security's drop-in replacements make it simple.
Book a demoAdditional Resources
- http://www.securitytracker.com/id/1038279
- https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
- https://github.com/apache/cxf/commit/20d0fa3ec41c16c52b74dcc006f9d9ea212fa80f
- https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
- http://www.securityfocus.com/bid/97968
- https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E
- https://nvd.nist.gov/vuln/detail/CVE-2017-5653
- https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E
- http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc?version=1&modificationDate=1492515074710&api=v2
- https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E
What are Similar Vulnerabilities to CVE-2017-5653?
Similar Vulnerabilities: CVE-2009-3555 , CVE-2014-3566 , CVE-2011-3389 , CVE-2008-5029 , CVE-2015-0205
