First published: Tue Aug 20 2013(Updated: )
`jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java` in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.santuario:xmlsec | >=1.5.0<1.5.5 | 1.5.5 |
maven/org.apache.santuario:xmlsec | >=1.4.0<1.4.8 | 1.4.8 |
Apache Santuario | =1.4.7 | |
Apache Santuario | =1.5.0 | |
Apache Santuario | =1.5.1 | |
Apache Santuario | =1.5.2 | |
Apache Santuario | =1.5.3 | |
Apache Santuario | =1.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2172 has a severity rating that allows context-dependent attackers to spoof XML Signatures.
To fix CVE-2013-2172, upgrade to Apache Santuario XML Security for Java version 1.4.8 or 1.5.5 or later.
CVE-2013-2172 affects Apache Santuario XML Security for Java versions 1.4.0 through 1.4.7 and 1.5.0 through 1.5.4.
Yes, CVE-2013-2172 can enable an attacker to potentially spoof XML Signatures, leading to exploitations.
Yes, the vulnerability CVE-2013-2172 is present in versions prior to 1.4.8 and 1.5.5 of Apache Santuario.