A SSRF vulnerability in WADL service description in versions of Apache CXF before 4.0.5, 3.6.4 and 3.5.9 allows an attacker to perform SSRF style attacks on REST webservices. The attack only applies if a custom stylesheet parameter is configured.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/4jtpsswn2r6xommol54p5mg263ysgdw2 | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Aug 2024, 17:31
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache
Apache cxf |
|
CPE | cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:* | |
References | () https://lists.apache.org/thread/4jtpsswn2r6xommol54p5mg263ysgdw2 - Mailing List, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
01 Aug 2024, 13:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Summary |
|
19 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-19 09:15
Updated : 2024-08-22 17:31
NVD link : CVE-2024-29736
Mitre link : CVE-2024-29736
CVE.ORG link : CVE-2024-29736
JSON object : View
Products Affected
apache
- cxf
CWE
CWE-918
Server-Side Request Forgery (SSRF)