CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2021-04-02T10:05:14

Updated: 2024-08-03T18:51:07.452Z

Reserved: 2021-01-06T00:00:00

Link: CVE-2021-22696

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-02T10:15:12.200

Modified: 2024-11-21T05:50:28.830

Link: CVE-2021-22696

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-04-02T00:00:00Z

Links: CVE-2021-22696 - Bugzilla