Path to dependency file: /protex-sdk-examples/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/2.7.18.SP5-redhat-1/ef87baffb7733629e4a21e311ec142311b095e99/cxf-rt-transports-http-2.7.18.SP5-redhat-1.jar,/es/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/2.7.18.SP5-redhat-1/ef87baffb7733629e4a21e311ec142311b095e99/cxf-rt-transports-http-2.7.18.SP5-redhat-1.jar
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.
CVE-2019-17573 - Medium Severity Vulnerability
Vulnerable Library - cxf-rt-transports-http-2.7.18.SP5-redhat-1.jar
Apache CXF Runtime HTTP Transport
Library home page: http://www.apache.org/
Path to dependency file: /protex-sdk-examples/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/2.7.18.SP5-redhat-1/ef87baffb7733629e4a21e311ec142311b095e99/cxf-rt-transports-http-2.7.18.SP5-redhat-1.jar,/es/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/2.7.18.SP5-redhat-1/ef87baffb7733629e4a21e311ec142311b095e99/cxf-rt-transports-http-2.7.18.SP5-redhat-1.jar
Dependency Hierarchy: - :x: **cxf-rt-transports-http-2.7.18.SP5-redhat-1.jar** (Vulnerable Library)
Found in HEAD commit: 2ba6d5eeaa521aaeb7b89b9a95f865606d367f8c
Found in base branch: master
Vulnerability Details
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.
Publish Date: 2020-01-16
URL: CVE-2019-17573
CVSS 3 Score Details (6.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/3h62d52yw0y9hzsj5nn3wwl0gqrhbd92
Release Date: 2020-01-16
Fix Resolution: 3.2.12
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.