CVE-2022-46363 (Medium) detected in cxf-rt-transports-http-3.1.0.jar, cxf-rt-transports-http-3.2.6.jar - autoclosed #715
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2022-46363 - Medium Severity Vulnerability
cxf-rt-transports-http-3.1.0.jar
Apache CXF Runtime HTTP Transport
Library home page: http://cxf.apache.org
Path to dependency file: /dd-java-agent/instrumentation/jax-rs-client-2.0/jax-rs-client-2.0.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/3.1.0/870ebad800e34974b5576a9c9ea53e8f2fcd1213/cxf-rt-transports-http-3.1.0.jar
Dependency Hierarchy:
cxf-rt-transports-http-3.2.6.jar
Apache CXF Runtime HTTP Transport
Library home page: http://cxf.apache.org
Path to dependency file: /dd-java-agent/instrumentation/jax-rs-client-2.0/jax-rs-client-2.0.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/3.2.6/bcd4ce1e6b8eb5110a12143df64874913b1e6a50/cxf-rt-transports-http-3.2.6.jar
Dependency Hierarchy:
Found in HEAD commit: 2819174635979a19573ec0ce8e3e2b63a3848079
Found in base branch: master
A vulnerability in Apache CXF before versions 3.5.5 and 3.4.10 allows an attacker to perform a remote directory listing or code exfiltration. The vulnerability only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, and so the vulnerability can only arise if the CXF service is misconfigured.
Publish Date: 2022-12-13
URL: CVE-2022-46363
Base Score Metrics:
Type: Upgrade version
Release Date: 2022-12-13
Fix Resolution (org.apache.cxf:cxf-rt-transports-http): 3.4.10
Direct dependency fix Resolution (org.apache.cxf:cxf-rt-rs-client): 3.1.6
Fix Resolution (org.apache.cxf:cxf-rt-transports-http): 3.4.10
Direct dependency fix Resolution (org.apache.cxf:cxf-rt-rs-client): 3.2.8
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: