Show plain JSON{"id": "CVE-2012-5575", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.4, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-08-19T23:55:08.127", "references": [{"url": "http://cxf.apache.org/cve-2012-5575.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0833.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0834.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0839.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0873.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0874.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0875.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0876.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0943.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-1143.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html", "source": "secalert@redhat.com"}, {"url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/60043", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E", "source": "secalert@redhat.com"}, {"url": "http://cxf.apache.org/cve-2012-5575.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0833.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0834.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0839.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0873.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0874.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0875.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0876.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0943.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-1143.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/60043", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-310"}]}], "descriptions": [{"lang": "en", "value": "Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \"XML Encryption backwards compatibility attack.\""}, {"lang": "es", "value": "Apache CXF en versiones 2.5.x anteriores a la 2.5.10, 2.6.x anteriores a CXF 2.6.7 y 2.7.x anteriores a CXF 2.7.4 no verifica que un algoritmo criptogr\u00e1fico espec\u00edfico est\u00e9 permitido por la definici\u00f3n de WS-SecurityPolicy AlgorithmSuite antes del descifrado, lo que permite a los atacantes remotos forzar a CXF a usar algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles que los previstos y facilita el descifrado de las comunicaciones. Esto tambi\u00e9n se conoce como \"XML Encryption backwards compatibility attack\"."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D24246B2-915D-494B-9863-CF0B662BE54D"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6915B2EC-AA31-44B5-A5F3-3EE1FDD0ABC7"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90280778-F7D6-49E2-9C7F-9F5F58137FDE"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "962F2A85-4731-450B-986B-E1A79986F143"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49F920D4-1102-4D30-ABD8-F47342DA735A"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84FD5387-E292-458A-9E8C-85C082461594"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D523A5E-24A7-43D7-AE54-02EBF13537D2"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC774B3E-D7E4-4FC1-AB09-392EC16F0F76"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A1ECB5D-F146-4E4A-BB9A-C96EB5C863A4"}, {"criteria": "cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1138E4D2-7CB6-42C0-91A8-D6C2BDC9F764"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4FC7D67-80A3-43F6-8D46-F13F37A017CF"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F069B04-FDA0-41C3-BCAC-C74A310078B7"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EED986C6-39C6-4F2A-86F7-C2CE9BBE25B4"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5CF2CB-B33D-4C51-84C3-8C10E3E26193"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BACD3A8-2FEE-4CB7-9229-06679D6D8150"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0835933D-4EA4-4C95-8964-984087537268"}, {"criteria": "cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "070739FD-9411-4BDB-A96F-3BC4A676A40F"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C629A8A7-BFB3-453B-9BCA-3873512410FA"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "346AF04F-E0C5-45EE-A421-2E1A4E2B57FB"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29777E8F-4DB3-4E9E-9FF4-D13749A7C0AE"}, {"criteria": "cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA20A9DA-2BEB-4699-A8D4-A90EA036693F"}, {"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB"}, {"criteria": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC50B7E2-35A0-4D2B-8865-69EF15C7B31E"}, {"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C57B8004-AF15-4F0F-B9FA-A3CFF7BD42DE"}, {"criteria": "cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38F66D5B-F906-437E-977E-F9F930648886"}, {"criteria": "cpe:2.3:a:redhat:jboss_fuse_esb_enterprise:7.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "658C466F-5DCB-4393-84A9-4B7A93F69724"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}