7.5
CWE
200
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2021-40690: Bypass of the secureValidation property

First published: Fri Sep 17 2021(Updated: )

All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.

Credit: security@apache.org security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
maven/org.apache.santuario:xmlsec<2.1.7
2.1.7
maven/org.apache.santuario:xmlsec>=2.2.0<2.2.3
2.2.3
redhat/eap7-apache-cxf<0:3.3.12-1.redhat_00001.1.el6ea
0:3.3.12-1.redhat_00001.1.el6ea
redhat/eap7-ironjacamar<0:1.5.3-1.Final_redhat_00001.1.el6ea
0:1.5.3-1.Final_redhat_00001.1.el6ea
redhat/eap7-jakarta-el<0:3.0.3-3.redhat_00007.1.el6ea
0:3.0.3-3.redhat_00007.1.el6ea
redhat/eap7-jboss-ejb-client<0:4.0.43-1.Final_redhat_00001.1.el6ea
0:4.0.43-1.Final_redhat_00001.1.el6ea
redhat/eap7-jboss-server-migration<0:1.7.2-10.Final_redhat_00011.1.el6ea
0:1.7.2-10.Final_redhat_00011.1.el6ea
redhat/eap7-jsoup<0:1.14.2-1.redhat_00002.1.el6ea
0:1.14.2-1.redhat_00002.1.el6ea
redhat/eap7-resteasy<0:3.11.5-1.Final_redhat_00001.1.el6ea
0:3.11.5-1.Final_redhat_00001.1.el6ea
redhat/eap7-undertow<0:2.0.41-1.SP1_redhat_00001.1.el6ea
0:2.0.41-1.SP1_redhat_00001.1.el6ea
redhat/eap7-wildfly<0:7.3.10-2.GA_redhat_00003.1.el6ea
0:7.3.10-2.GA_redhat_00003.1.el6ea
redhat/eap7-wildfly-elytron<0:1.10.15-1.Final_redhat_00001.1.el6ea
0:1.10.15-1.Final_redhat_00001.1.el6ea
redhat/eap7-wss4j<0:2.2.7-1.redhat_00001.1.el6ea
0:2.2.7-1.redhat_00001.1.el6ea
redhat/eap7-xml-security<0:2.1.7-1.redhat_00001.1.el6ea
0:2.1.7-1.redhat_00001.1.el6ea
redhat/eap7-apache-cxf<0:3.3.12-1.redhat_00001.1.el7ea
0:3.3.12-1.redhat_00001.1.el7ea
redhat/eap7-ironjacamar<0:1.5.3-1.Final_redhat_00001.1.el7ea
0:1.5.3-1.Final_redhat_00001.1.el7ea
redhat/eap7-jakarta-el<0:3.0.3-3.redhat_00007.1.el7ea
0:3.0.3-3.redhat_00007.1.el7ea
redhat/eap7-jboss-ejb-client<0:4.0.43-1.Final_redhat_00001.1.el7ea
0:4.0.43-1.Final_redhat_00001.1.el7ea
redhat/eap7-jboss-server-migration<0:1.7.2-10.Final_redhat_00011.1.el7ea
0:1.7.2-10.Final_redhat_00011.1.el7ea
redhat/eap7-jsoup<0:1.14.2-1.redhat_00002.1.el7ea
0:1.14.2-1.redhat_00002.1.el7ea
redhat/eap7-resteasy<0:3.11.5-1.Final_redhat_00001.1.el7ea
0:3.11.5-1.Final_redhat_00001.1.el7ea
redhat/eap7-undertow<0:2.0.41-1.SP1_redhat_00001.1.el7ea
0:2.0.41-1.SP1_redhat_00001.1.el7ea
redhat/eap7-wildfly<0:7.3.10-2.GA_redhat_00003.1.el7ea
0:7.3.10-2.GA_redhat_00003.1.el7ea
redhat/eap7-wildfly-elytron<0:1.10.15-1.Final_redhat_00001.1.el7ea
0:1.10.15-1.Final_redhat_00001.1.el7ea
redhat/eap7-wss4j<0:2.2.7-1.redhat_00001.1.el7ea
0:2.2.7-1.redhat_00001.1.el7ea
redhat/eap7-xml-security<0:2.1.7-1.redhat_00001.1.el7ea
0:2.1.7-1.redhat_00001.1.el7ea
redhat/eap7-apache-cxf<0:3.3.12-1.redhat_00001.1.el8ea
0:3.3.12-1.redhat_00001.1.el8ea
redhat/eap7-ironjacamar<0:1.5.3-1.Final_redhat_00001.1.el8ea
0:1.5.3-1.Final_redhat_00001.1.el8ea
redhat/eap7-jakarta-el<0:3.0.3-3.redhat_00007.1.el8ea
0:3.0.3-3.redhat_00007.1.el8ea
redhat/eap7-jboss-ejb-client<0:4.0.43-1.Final_redhat_00001.1.el8ea
0:4.0.43-1.Final_redhat_00001.1.el8ea
redhat/eap7-jboss-server-migration<0:1.7.2-10.Final_redhat_00011.1.el8ea
0:1.7.2-10.Final_redhat_00011.1.el8ea
redhat/eap7-jsoup<0:1.14.2-1.redhat_00002.1.el8ea
0:1.14.2-1.redhat_00002.1.el8ea
redhat/eap7-resteasy<0:3.11.5-1.Final_redhat_00001.1.el8ea
0:3.11.5-1.Final_redhat_00001.1.el8ea
redhat/eap7-undertow<0:2.0.41-1.SP1_redhat_00001.1.el8ea
0:2.0.41-1.SP1_redhat_00001.1.el8ea
redhat/eap7-wildfly<0:7.3.10-2.GA_redhat_00003.1.el8ea
0:7.3.10-2.GA_redhat_00003.1.el8ea
redhat/eap7-wildfly-elytron<0:1.10.15-1.Final_redhat_00001.1.el8ea
0:1.10.15-1.Final_redhat_00001.1.el8ea
redhat/eap7-wss4j<0:2.2.7-1.redhat_00001.1.el8ea
0:2.2.7-1.redhat_00001.1.el8ea
redhat/eap7-xml-security<0:2.1.7-1.redhat_00001.1.el8ea
0:2.1.7-1.redhat_00001.1.el8ea
redhat/rh-sso7-keycloak<0:15.0.4-1.redhat_00001.1.el7
0:15.0.4-1.redhat_00001.1.el7
redhat/rh-sso7-keycloak<0:15.0.4-1.redhat_00001.1.el8
0:15.0.4-1.redhat_00001.1.el8
redhat/redhat-sso<7-sso75-openshift-rhel8
7-sso75-openshift-rhel8
debian/libxml-security-java
2.0.10-2+deb10u1
2.0.10-2+deb11u1
2.1.7-3
redhat/xmlsec-2.1.7 xmlsec<2.2.3
2.2.3
IBM Sterling Secure Proxy<=6.0.0.06.0.1.06.0.2.06.0.3.0
IBM Sterling Secure Proxy<=6.1.0.0
Apache Santuario<2.1.7
Apache Santuario>=2.2.0<2.2.3
Apache CXF=3.4.4
Apache TomEE<8.0.8
Debian Linux=9.0
Debian Linux=10.0
Debian Linux=11.0
Oracle Agile Product Lifecycle Management Framework=9.3.6
Oracle Commerce=11.3.2
Oracle Commerce=11.3.2
Oracle Communications Diameter Intelligence Hub>=8.0.0<=8.1.0
Oracle Communications Diameter Intelligence Hub>=8.2.0<=8.2.3
Sun iPlanet Messaging Server=8.1
Oracle FLEXCUBE Private Banking=12.1.0
Oracle Outside In Technology=8.5.5
Oracle PeopleTools=8.58
Oracle PeopleTools=8.59
Oracle Retail Bulk Data Integration=16.0.3
Oracle Retail Financial Integration=14.1.3.2
Oracle Retail Financial Integration=15.0.3.1
Oracle Retail Financial Integration=16.0.3
Oracle Retail Financial Integration=19.0.1
Oracle Retail Integration Bus=14.1.3.2
Oracle Retail Integration Bus=15.0.3.1
Oracle Retail Integration Bus=16.0.3
Oracle Retail Integration Bus=19.0.1
Oracle Retail Merchandising System=16.0.3
Oracle Retail Merchandising System=19.0.1
Oracle Retail Service Backbone=14.1.3.2
Oracle Retail Service Backbone=15.0.3.1
Oracle Retail Service Backbone=16.0.3
Oracle Retail Service Backbone=19.0.1
Oracle WebLogic Server=12.2.1.4.0
Oracle WebLogic Server=14.1.1.0.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2021-40690?

    CVE-2021-40690 is classified as a medium-severity vulnerability affecting specific versions of Apache Santuario - XML Security for Java.

  • How do I fix CVE-2021-40690?

    To mitigate CVE-2021-40690, upgrade to Apache Santuario - XML Security for Java version 2.2.3 or 2.1.7.

  • What are the affected versions of CVE-2021-40690?

    All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are affected by CVE-2021-40690.

  • What types of attacks are possible due to CVE-2021-40690?

    CVE-2021-40690 could potentially allow an attacker to exploit an improper validation issue during the creation of KeyInfo from a KeyInfoReference element.

  • Which products could be impacted by CVE-2021-40690?

    Products using vulnerable versions of Apache Santuario - XML Security for Java, including certain IBM Sterling Secure Proxy and Red Hat products, may be impacted by CVE-2021-40690.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203