-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 CVE-2017-3156: Apache CXF OAuth2 Hawk and JOSE MAC Validation code is vulnerable to the timing attacks Severity: Major Vendor: The Apache Software Foundation Versions Affected: This vulnerability affects all versions of Apache CXF prior to 3.0.13, 3.1.10. Description: Apache CXF OAuth2 Hawk and JOSE MAC Validation code is not using a constant time MAC signature comparison algorithm which may be exploited by some sophisticated timing attacks. It may only affect OAuth2 Hawk or JWT access tokens or JOSE JWS/JWE interceptors which depend on HMac secret key algorithms. This has been fixed in revisions: CXF 3.1.x: http://git-wip-us.apache.org/repos/asf/cxf/commit/555843f9 CXF 3.0.x http://git-wip-us.apache.org/repos/asf/cxf/commit/1338469f CXF 3.2.0-SNAPSHOT (master): http://git-wip-us.apache.org/repos/asf/cxf/commit/e66ce235 Credit: The issue was reported and the patch provided by Richard Kettelerij. Migration: CXF 3.0.x users should upgrade to 3.0.13 or later as soon as possible. CXF 3.1.x users should upgrade to 3.1.10 or later as soon as possible. References: http://cxf.apache.org/security-advisories.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAliq0rIACgkQmcduTd7eq5LohQCgkIiSd26xoIzt/+Pi0r8ri0HD bbQAn3C5Y8DNes7QGRUP6Dv1hVRrmP2y =0YqU -----END PGP SIGNATURE-----