CVE-2020-13954: Cross-site scripting in Apache CXF
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.91677%
CWE
Published
4/22/2021
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.cxf:apache-cxf | maven | < 3.3.8 | 3.3.8 |
org.apache.cxf:apache-cxf | maven | >= 3.4.0, < 3.4.1 | 3.4.1 |
org.apache.cxf:cxf | maven | < 3.3.8 | 3.3.8 |
org.apache.cxf:cxf | maven | >= 3.4.0, < 3.4.1 | 3.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unencoded output of the styleSheetPath
parameter in the services listing page. ServiceListGenerator
is the known class responsible for generating this page in Apache CXF
. The writeStyleSheet
method would be directly responsible for outputting the stylesheet link element using the user-controlled parameter value. The generateDocument
method would show up in stack traces as the entry point for page generation. The patch would have added HTML encoding for the styleSheetPath
parameter value in these locations.