On 2010/06/17 0:29, Daniel Kulp wrote:
> 
> 
> The Apache CXF team recently discovered a security issue that may allow an 
> attacker to carry out denial of service attacks and to read arbitrary files 
> on 
> the file system of the node where CXF runs. Details of the vulnerability are 
> described in the following advisory:
> 
> http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf
> 

I know it is better to upgrade, but just to confirm, are we OK if we are using
only SOAP binding (@BindingType("http://schemas.xmlsoap.org/wsdl/soap/http";))? I
did test it with the example exploits in the advisory, and it doesn't seem to be
vulnerable, but could you confirm?




Reply via email to