Show plain JSON{"id": "CVE-2014-0035", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-07-07T14:55:03.397", "references": [{"url": "http://cxf.apache.org/security-advisories.data/CVE-2014-0035.txt.asc", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0797.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0798.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0799.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1351.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html", "source": "secalert@redhat.com"}, {"url": "http://svn.apache.org/viewvc?view=revision&revision=1564724", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "http://cxf.apache.org/security-advisories.data/CVE-2014-0035.txt.asc", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0797.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0798.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0799.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1351.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://svn.apache.org/viewvc?view=revision&revision=1564724", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-310"}]}], "descriptions": [{"lang": "en", "value": "The SymmetricBinding in Apache CXF before 2.6.13 and 2.7.x before 2.7.10, when EncryptBeforeSigning is enabled and the UsernameToken policy is set to an EncryptedSupportingToken, transmits the UsernameToken in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network."}, {"lang": "es", "value": "SymmetricBinding en Apache CXF anterior a 2.6.13 y 2.7.x anterior a 2.7.10, cuando EncryptBeforeSigning est\u00e1 habilitado y la pol\u00edtica UsernameToken est\u00e1 configurada en un EncryptedSupportingToken, transmite el UsernameToken en texto claro, lo que permite a atacantes remotos obtener informaci\u00f3n sensible mediante la captura de trafico de la red."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FB030A1-6479-4D24-95EB-B8821D09C2BA", "versionEndIncluding": "2.6.12"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4FC7D67-80A3-43F6-8D46-F13F37A017CF"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F069B04-FDA0-41C3-BCAC-C74A310078B7"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EED986C6-39C6-4F2A-86F7-C2CE9BBE25B4"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5CF2CB-B33D-4C51-84C3-8C10E3E26193"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BACD3A8-2FEE-4CB7-9229-06679D6D8150"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0835933D-4EA4-4C95-8964-984087537268"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "070739FD-9411-4BDB-A96F-3BC4A676A40F"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F80936AF-AB6F-4256-85D3-E6E3ADF574E2"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE6234A1-F4E4-44E0-B986-A8964DD52785"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF4FC26A-2767-4E57-BCDA-D55620692202"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "543E6D15-6C3B-4031-AB2F-2C828281FADA"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "896C1342-1B61-48E1-B915-65319A01661B"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C629A8A7-BFB3-453B-9BCA-3873512410FA"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "346AF04F-E0C5-45EE-A421-2E1A4E2B57FB"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29777E8F-4DB3-4E9E-9FF4-D13749A7C0AE"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA20A9DA-2BEB-4699-A8D4-A90EA036693F"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "789F6EB3-43A8-4CFA-9A79-31AEDCF22344"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D97E063-EBB9-4676-8C51-0FF4455F3077"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BF1E39F-B945-46B4-BEF0-A26CF04C39E0"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C508FB9-835A-4240-9F61-21C1D73C00B2"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1291D3AB-739F-4C5C-AE27-B3A09495E86C"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73090184-1733-4B10-867B-D1D7E125B437"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D"}, {"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82B6C055-25E2-4C78-ACA7-D722848BDBC4"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}