Apache CXF 跨站脚本漏洞
CNNVD-ID编号 | CNNVD-202001-832 | CVE编号 | CVE-2019-17573 |
发布时间 | 2020-01-16 | 更新时间 | 2021-01-21 |
漏洞类型 | 跨站脚本 | 漏洞来源 | N/A |
危险等级 | 中危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
Apache CXF是美国阿帕奇(Apache)软件基金会的一个开源的Web服务框架。该框架支持多种Web服务标准、多种前端编程API等。
Apache CXF中的/services页面存在安全漏洞。攻击者可利用该漏洞向Web页面中注入JavaScript代码。
漏洞补丁
目前厂商已发布升级了Apache CXF 跨站脚本漏洞的补丁,Apache CXF 跨站脚本漏洞的补丁获取链接:
http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2
参考网址
来源:CONFIRM
来源:MLIST
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2020/11/12/2
来源:MLIST
来源:lists.apache.org
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1007/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158636/Red-Hat-Security-Advisory-2020-3192-01.html
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157859/Red-Hat-Security-Advisory-2020-2333-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2588/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2536/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2619/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-17573
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apache-CXF-Cross-Site-Scripting-via-Endpoint-Names-31835
来源:www.ibm.com
来源:www.ibm.com
来源:http-server-and-ibm-websphere-application-server-used-in-ibm-websphere-application-server-in-ibm-cloud
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-the-ibm-
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1882/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1662/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2050/
来源:www.ibm.com
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48852
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0935/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158651/Red-Hat-Security-Advisory-2020-3197-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157642/Red-Hat-Security-Advisory-2020-2058-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158532/Red-Hat-Security-Advisory-2020-2905-01.html
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158048/Red-Hat-Security-Advisory-2020-2512-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2042/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2199/
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157664/Red-Hat-Security-Advisory-2020-2112-01.html
来源:www.ibm.com
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202001-832

评论