Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2014-3623

Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.016
EPSS Ranking 80.7%
CVSS Severity
CVSS v2 Score 5.0
References
Products affected by CVE-2014-3623
  • Apache » Cxf » Version: 2.7.0
    cpe:2.3:a:apache:cxf:2.7.0
  • Apache » Cxf » Version: 2.7.1
    cpe:2.3:a:apache:cxf:2.7.1
  • Apache » Cxf » Version: 2.7.10
    cpe:2.3:a:apache:cxf:2.7.10
  • Apache » Cxf » Version: 2.7.11
    cpe:2.3:a:apache:cxf:2.7.11
  • Apache » Cxf » Version: 2.7.12
    cpe:2.3:a:apache:cxf:2.7.12
  • Apache » Cxf » Version: 2.7.13
    cpe:2.3:a:apache:cxf:2.7.13
  • Apache » Cxf » Version: 2.7.2
    cpe:2.3:a:apache:cxf:2.7.2
  • Apache » Cxf » Version: 2.7.3
    cpe:2.3:a:apache:cxf:2.7.3
  • Apache » Cxf » Version: 2.7.4
    cpe:2.3:a:apache:cxf:2.7.4
  • Apache » Cxf » Version: 2.7.5
    cpe:2.3:a:apache:cxf:2.7.5
  • Apache » Cxf » Version: 2.7.6
    cpe:2.3:a:apache:cxf:2.7.6
  • Apache » Cxf » Version: 2.7.7
    cpe:2.3:a:apache:cxf:2.7.7
  • Apache » Cxf » Version: 2.7.8
    cpe:2.3:a:apache:cxf:2.7.8
  • Apache » Cxf » Version: 2.7.9
    cpe:2.3:a:apache:cxf:2.7.9
  • Apache » Cxf » Version: 3.0.0
    cpe:2.3:a:apache:cxf:3.0.0
  • Apache » Cxf » Version: 3.0.1
    cpe:2.3:a:apache:cxf:3.0.1
  • Apache » Wss4j » Version: 1.0.0
    cpe:2.3:a:apache:wss4j:1.0.0
  • Apache » Wss4j » Version: 1.1.0
    cpe:2.3:a:apache:wss4j:1.1.0
  • Apache » Wss4j » Version: 1.5.0
    cpe:2.3:a:apache:wss4j:1.5.0
  • Apache » Wss4j » Version: 1.5.1
    cpe:2.3:a:apache:wss4j:1.5.1
  • Apache » Wss4j » Version: 1.5.10
    cpe:2.3:a:apache:wss4j:1.5.10
  • Apache » Wss4j » Version: 1.5.11
    cpe:2.3:a:apache:wss4j:1.5.11
  • Apache » Wss4j » Version: 1.5.12
    cpe:2.3:a:apache:wss4j:1.5.12
  • Apache » Wss4j » Version: 1.5.2
    cpe:2.3:a:apache:wss4j:1.5.2
  • Apache » Wss4j » Version: 1.5.3
    cpe:2.3:a:apache:wss4j:1.5.3
  • Apache » Wss4j » Version: 1.5.4
    cpe:2.3:a:apache:wss4j:1.5.4
  • Apache » Wss4j » Version: 1.5.5
    cpe:2.3:a:apache:wss4j:1.5.5
  • Apache » Wss4j » Version: 1.5.6
    cpe:2.3:a:apache:wss4j:1.5.6
  • Apache » Wss4j » Version: 1.5.7
    cpe:2.3:a:apache:wss4j:1.5.7
  • Apache » Wss4j » Version: 1.5.8
    cpe:2.3:a:apache:wss4j:1.5.8
  • Apache » Wss4j » Version: 1.5.9
    cpe:2.3:a:apache:wss4j:1.5.9
  • Apache » Wss4j » Version: 1.6.0
    cpe:2.3:a:apache:wss4j:1.6.0
  • Apache » Wss4j » Version: 1.6.1
    cpe:2.3:a:apache:wss4j:1.6.1
  • Apache » Wss4j » Version: 1.6.10
    cpe:2.3:a:apache:wss4j:1.6.10
  • Apache » Wss4j » Version: 1.6.11
    cpe:2.3:a:apache:wss4j:1.6.11
  • Apache » Wss4j » Version: 1.6.12
    cpe:2.3:a:apache:wss4j:1.6.12
  • Apache » Wss4j » Version: 1.6.13
    cpe:2.3:a:apache:wss4j:1.6.13
  • Apache » Wss4j » Version: 1.6.14
    cpe:2.3:a:apache:wss4j:1.6.14
  • Apache » Wss4j » Version: 1.6.15
    cpe:2.3:a:apache:wss4j:1.6.15
  • Apache » Wss4j » Version: 1.6.16
    cpe:2.3:a:apache:wss4j:1.6.16
  • Apache » Wss4j » Version: 1.6.2
    cpe:2.3:a:apache:wss4j:1.6.2
  • Apache » Wss4j » Version: 1.6.3
    cpe:2.3:a:apache:wss4j:1.6.3
  • Apache » Wss4j » Version: 1.6.4
    cpe:2.3:a:apache:wss4j:1.6.4
  • Apache » Wss4j » Version: 1.6.5
    cpe:2.3:a:apache:wss4j:1.6.5
  • Apache » Wss4j » Version: 1.6.6
    cpe:2.3:a:apache:wss4j:1.6.6
  • Apache » Wss4j » Version: 1.6.7
    cpe:2.3:a:apache:wss4j:1.6.7
  • Apache » Wss4j » Version: 1.6.8
    cpe:2.3:a:apache:wss4j:1.6.8
  • Apache » Wss4j » Version: 1.6.9
    cpe:2.3:a:apache:wss4j:1.6.9
  • Apache » Wss4j » Version: 2.0.0
    cpe:2.3:a:apache:wss4j:2.0.0
  • Apache » Wss4j » Version: 2.0.1
    cpe:2.3:a:apache:wss4j:2.0.1


Contact Us

Shodan ® - All rights reserved