TLS Hostname Verification Issue in Apache CXF by The Apache Software Foundation
CVE-2018-8039
Key Information:
- Vendor
- Apache
- Status
- Vendor
- CVE Published:
- 2 July 2018
Badges
Summary
Apache CXF can be configured to utilize an outdated SSL implementation, which leads to improper handling of TLS hostname verification. This issue arises when the system property 'java.protocol.handler.pkgs' points to the non-secure com.sun.net.ssl package. The CXF framework attempts to implement hostname verification through reflection, but the default HostnameVerifier fails to properly propagate errors. As a result, clients utilizing the com.sun.net.ssl stack may inadvertently bypass critical security checks, leaving them exposed to potential man-in-the-middle attacks, where malicious entities could intercept sensitive communications without detection.
Affected Version(s)
Apache CXF prior to 3.1.16
Apache CXF 3.2.x prior to 3.2.5
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved