First published: Fri Oct 20 2023(Updated: )
All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled. Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Santuario XML Security for Java | <2.2.6 | |
Apache Santuario XML Security for Java | >=2.3.0<2.3.4 | |
Apache Santuario XML Security for Java | >=3.0.0<3.0.3 | |
maven/org.apache.santuario:xmlsec | >=3.0.0<3.0.3 | 3.0.3 |
maven/org.apache.santuario:xmlsec | <2.2.6 | 2.2.6 |
maven/org.apache.santuario:xmlsec | >=2.3.0<2.3.4 | 2.3.4 |
redhat/santuario | <2.2.6 | 2.2.6 |
redhat/santuario | <2.3.4 | 2.3.4 |
redhat/santuario | <3.0.3 | 3.0.3 |
IBM Cognos Analytics | <=12.0.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44483 is a vulnerability in Apache Santuario - XML Security for Java that allows the disclosure of a private key in log files when generating an XML Signature and logging with debug level is enabled.
CVE-2023-44483 affects all versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3 when using the JSR 105 API.
To fix CVE-2023-44483, users are recommended to upgrade Apache Santuario - XML Security for Java to version 3.0.3 if using version 3, version 2.2.6 if using version 2, or version 2.3.4 if using version 3.
More information about CVE-2023-44483 can be found on the Apache Santuario mailing list, the Openwall OSS Security mailing list, and the NIST National Vulnerability Database.
The CWE ID for CVE-2023-44483 is 532.