Описание
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Decision Manager 7 | xmlsec | Not affected | ||
| Red Hat JBoss BRMS 5 | xmlsec | Out of support scope | ||
| Red Hat JBoss Data Virtualization 6 | xmlsec | Out of support scope | ||
| Red Hat JBoss Enterprise Application Platform 5 | xmlsec | Out of support scope | ||
| Red Hat JBoss Enterprise Application Platform 6 | xmlsec | Out of support scope | ||
| Red Hat JBoss Fuse 6 | camel-xmlsecurity | Out of support scope | ||
| Red Hat JBoss Fuse 6 | xmlsec | Out of support scope | ||
| Red Hat JBoss Fuse Service Works 6 | camel-xmlsecurity | Out of support scope | ||
| Red Hat JBoss Operations Network 3 | xmlsec | Out of support scope | ||
| Red Hat JBoss SOA Platform 5 | xmlsec | Out of support scope |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
Связанные уязвимости
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
In version 2.0.3 Apache Santuario XML Security for Java, a caching mec ...
Improper input validation in Apache Santuario XML Security for Java
Уязвимость DOM-анализатора DocumentBuilders платформы для обеспечения стандартов безопасности для XML Apache Santuario XML Security for Java, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS
5.9 Medium
CVSS3