Описание
jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."
A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially crafted XML signature block.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat JBoss Enterprise Application Platform 4 | xmlsec | Will not fix | ||
| Red Hat JBoss Enterprise Web Server 1 | fuse-6 | Affected | ||
| Red Hat JBoss Enterprise Web Server 1 | fuse-enterprise-esb-7 | Affected | ||
| Red Hat JBoss Operations Network 3.1 | xmlsec | Affected | ||
| Red Hat JBoss Portal 4 | xmlsec | Will not fix | ||
| Red Hat JBoss Portal 5 | xmlsec | Will not fix | ||
| Red Hat JBoss SOA Platform 4.2 | xmlsec | Will not fix | ||
| Red Hat JBoss SOA Platform 4.3 | xmlsec | Will not fix | ||
| Fuse ESB Enterprise 7.1.0 | Fixed | RHSA-2014:1369 | 09.10.2014 | |
| Fuse Management Console 7.1.0 | Fixed | RHSA-2014:1369 | 09.10.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."
jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."
jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache San ...
Inefficient Algorithmic Complexity in Apache Santuario XML Security
Уязвимость компонента jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java платформы для обеспечения стандартов безопасности для XML Apache Santuario XML Security for Java, позволяющая нарушителю подменить XML-подпись
EPSS
5.8 Medium
CVSS2