First published: Tue Aug 20 2013(Updated: )
`jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java` in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.santuario:xmlsec | >=1.5.0<1.5.5 | 1.5.5 |
maven/org.apache.santuario:xmlsec | >=1.4.0<1.4.8 | 1.4.8 |
Apache Santuario XML Security for Java | =1.4.7 | |
Apache Santuario XML Security for Java | =1.5.0 | |
Apache Santuario XML Security for Java | =1.5.1 | |
Apache Santuario XML Security for Java | =1.5.2 | |
Apache Santuario XML Security for Java | =1.5.3 | |
Apache Santuario XML Security for Java | =1.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.