Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-2172

Опубликовано: 25 июн. 2013
Источник: redhat
CVSS2: 5.8
EPSS Низкий

Описание

jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."

A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially crafted XML signature block.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 4xmlsecWill not fix
Red Hat JBoss Enterprise Web Server 1fuse-6Affected
Red Hat JBoss Enterprise Web Server 1fuse-enterprise-esb-7Affected
Red Hat JBoss Operations Network 3.1xmlsecAffected
Red Hat JBoss Portal 4xmlsecWill not fix
Red Hat JBoss Portal 5xmlsecWill not fix
Red Hat JBoss SOA Platform 4.2xmlsecWill not fix
Red Hat JBoss SOA Platform 4.3xmlsecWill not fix
Fuse ESB Enterprise 7.1.0FixedRHSA-2014:136909.10.2014
Fuse Management Console 7.1.0FixedRHSA-2014:136909.10.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-290

EPSS

Процентиль: 90%
0.05394
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."

nvd
больше 12 лет назад

jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."

debian
больше 12 лет назад

jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache San ...

github
больше 3 лет назад

Inefficient Algorithmic Complexity in Apache Santuario XML Security

CVSS3: 5.3
fstec
больше 12 лет назад

Уязвимость компонента jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java платформы для обеспечения стандартов безопасности для XML Apache Santuario XML Security for Java, позволяющая нарушителю подменить XML-подпись

EPSS

Процентиль: 90%
0.05394
Низкий

5.8 Medium

CVSS2

Уязвимость CVE-2013-2172