Open mend-for-github-com[bot] opened 3 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
:information_source: This issue was automatically re-opened by WhiteSource because the vulnerable library in the specific branch(es) has been detected in the WhiteSource inventory.
CVE-2020-13954 - Medium Severity Vulnerability
Vulnerable Library - cxf-rt-transports-http-3.3.7.jar
Apache CXF Runtime HTTP Transport
Path to dependency file: /testsuite/integration-arquillian/test-apps/fuse/product-app-fuse/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/cxf/cxf-rt-transports-http/3.3.7/cxf-rt-transports-http-3.3.7.jar,/home/wss-scanner/.m2/repository/org/apache/cxf/cxf-rt-transports-http/3.3.7/cxf-rt-transports-http-3.3.7.jar
Dependency Hierarchy: - fuse-example-cxf-jaxws-13.0.0-SNAPSHOT.jar (Root Library) - :x: **cxf-rt-transports-http-3.3.7.jar** (Vulnerable Library)
Found in HEAD commit: 34eee947640ca637662cb41e649c6acf8b6d8c2e
Found in base branch: master
Vulnerability Details
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.
Publish Date: 2020-11-12
URL: CVE-2020-13954
CVSS 3 Score Details (6.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2
Release Date: 2020-11-12
Fix Resolution: org.apache.cxf:cxf-rt-transports-http:3.3.8, org.apache.cxf:cxf-rt-transports-http:3.4.1