On 2010/06/17 0:29, Daniel Kulp wrote:
>
>
> The Apache CXF team recently discovered a security issue that may allow an
> attacker to carry out denial of service attacks and to read arbitrary files
> on
> the file system of the node where CXF runs. Details of the vulnerability are
> described in the following advisory:
>
> http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf
>
I know it is better to upgrade, but just to confirm, are we OK if we are using
only SOAP binding (@BindingType("http://schemas.xmlsoap.org/wsdl/soap/http"))? I
did test it with the example exploits in the advisory, and it doesn't seem to be
vulnerable, but could you confirm?