First published: Wed Jan 21 2015(Updated: )
Apache Santuario XML Security for Java 2.0.x before 2.0.3 allows remote attackers to bypass the streaming XML signature protection mechanism via a crafted XML document.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.santuario:xmlsec | >=2.0.0<2.0.3 | 2.0.3 |
Apache Santuario | =2.0.0 | |
Apache Santuario | =2.0.1 | |
Apache Santuario | =2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8152 is considered a moderate severity vulnerability due to its potential to allow attackers to bypass security mechanisms.
To fix CVE-2014-8152, upgrade Apache Santuario XML Security for Java to version 2.0.3 or later.
CVE-2014-8152 affects Apache Santuario XML Security for Java versions 2.0.0 to 2.0.2.
CVE-2014-8152 allows remote attackers to exploit crafted XML documents to bypass the streaming XML signature protection.
There are no known effective workarounds for CVE-2014-8152; upgrading is the recommended solution.