Matt Posted July 10, 2013 Report Posted July 10, 2013 Description : Apache CXF versions prior to 2.5.10, 2.6.7, and 2.7.4 suffer from a denial of service vulnerability.Author : A. Falkenberg, Joerg Schwenk, Juraj Somorovsky, Christian MainkaSource : Apache CXF 2.5.10 / 2.6.7 / 2.7.4 Denial Of Service ? Packet StormCode : SEC Consult Vulnerability Lab Security Advisory < 20130709-0 >======================================================================= title: Denial of service vulnerability product: Apache CXF vulnerable version: Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 fixed version: Apache CXF 2.5.10, 2.6.7 and 2.7.4 onwards CVE number: CVE-2013-2160 impact: Critical homepage: http://cxf.apache.org/ found: 2013-02-01 by: Andreas Falkenberg, SEC Consult Vulnerability Lab Christian Mainka, Ruhr-University Bochum Juraj Somorovsky, Ruhr-University Bochum Joerg Schwenk, Ruhr-University Bochum https://www.sec-consult.com=======================================================================Vendor/product description:------------------------------------------------------------------------------"Apache CXF is an open source services framework. CXF helps you build and develop services using frontend programming APIs, like JAX-WS and JAX-RS. These services can speak a variety of protocols such as SOAP, XML/HTTP, RESTful HTTP, or CORBA and work over a variety of transports such as HTTP, JMS or JBI."URL: http://cxf.apache.org/Business recommendation:------------------------------------------------------------------------------Various denial of service attack vectors were found within Apache CXF. The recommendation of SEC Consult is to immediately perform an update.Vulnerability overview/description:------------------------------------------------------------------------------It is possible to execute Denial of Service attacks on Apache CXF, exploitingthe fact that the streaming XML parser does not put limits on things like thenumber of elements, number of attributes, the nested structure of the documentreceived, etc. The effects of these attacks can vary from causing high CPUusage, to causing the JVM to run out of memory.URL: http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.ascProof of concept:------------------------------------------------------------------------------The following SOAP message will trigger a denial of service:<?xml version="1.0"?><soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope"> <soap:Body> <element> <element> <element> <element> [thousands more] </element> </element> </element> </element> </soap:Body></soap:Envelope>There are various other XML payloads that will also trigger a denial of service on vulnerable services.Vulnerable / tested versions:------------------------------------------------------------------------------This vulnerability affects all versions of Apache CXF prior to 2.5.10, 2.6.7and 2.7.4.Vendor contact timeline:------------------------------------------------------------------------------2013-02-22: Advisory sent to vendor by Juraj Somorovsky (RUB)2013-02-22: Advisory acknowledged by vendor2013-04-19: Vendor confirms vulnerability2013-05-15: Vendor publishes fixed version2013-06-27: Vulnerability is disclosed by vendor2013-07-09: SEC Consult releases security advisory Solution:------------------------------------------------------------------------------CXF 2.5.x users should upgrade to 2.5.10 or later as soon as possible.CXF 2.6.x users should upgrade to 2.6.7 or later as soon as possible.CXF 2.7.x users should upgrade to 2.7.4 or later as soon as possible.Also see the advisory of the vendor:http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.ascWorkaround:------------------------------------------------------------------------------No workaround available.Advisory URL:------------------------------------------------------------------------------https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~SEC Consult Vulnerability LabSEC ConsultVienna - Bangkok - Frankfurt/Main - Montreal - Singapore - VilniusHeadquarter:Mooslackengasse 17, 1190 Vienna, AustriaPhone: +43 1 8903043 0Fax: +43 1 8903043 15Mail: research at sec-consult dot comWeb: https://www.sec-consult.comBlog: http://blog.sec-consult.comTwitter: https://twitter.com/sec_consultEOF Andreas Falkenberg / @2013 Quote