ABSTRACT

Using a UsernameToken with a plain text password over an unencrypted channel exposes the password to attackers who can sniff the SOAP messages.

EXPLANATION

Service Providers that use the UsernameToken might accept passwords sent in clear text. Sending cleartext passwords over an unencrypted channel can expose the credential to any attacker who can sniff the SOAP message.

The following Axis 2 service provider configuration uses a UsernameToken:


<service>
...
<parameter name="InflowSecurity">
<action>
<items>UsernameToken</items>
...
</service>

REFERENCES

[1] Standards Mapping - OWASP Top 10 2010 - (OWASP 2010) A7 Insecure Cryptographic Storage

[2] Standards Mapping - OWASP Top 10 2007 - (OWASP 2007) A8 Insecure Cryptographic Storage

[3] Standards Mapping - OWASP Top 10 2004 - (OWASP 2004) A8 Insecure Storage

[4] Standards Mapping - Security Technical Implementation Guide Version 3 - (STIG 3) APP3250.1 CAT I, APP3250.2 CAT I, APP3250.3 CAT II, APP3250.4 CAT II, APP3330 CAT I

[5] Standards Mapping - FIPS200 - (FISMA) CM

[6] Standards Mapping - Common Weakness Enumeration - (CWE) CWE ID 311

[7] Standards Mapping - Web Application Security Consortium 24 + 2 - (WASC 24 + 2) Insufficient Authentication

[8] Standards Mapping - SANS Top 25 2010 - (SANS 2010) Porous Defenses - CWE ID 311

[9] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2 - (PCI 1.2) Requirement 4.1, Requirement 6.3.1.3, Requirement 6.5.8, Requirement 8.4

[10] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0 - (PCI 2.0) Requirement 4.1, Requirement 6.5.3, Requirement 8.4

[11] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1 - (PCI 1.1) Requirement 4.1, Requirement 6.5.8, Requirement 8.4

[12] Securing SOAP Messages with Rampart Apache Software Foundation

[13] Web Services Security Username Token Profile 1.0 OASIS

[14] Web Services Security: SOAP Message Security 1.1 OASIS