First published: Wed Jun 26 2024(Updated: )
Apache XML Security for C++ through 2.0.4 implements the XML Signature Syntax and Processing (XMLDsig) specification without protection against an SSRF payload in a KeyInfo element. NOTE: the project disputes this CVE Record on the grounds that any vulnerabilities are the result of a failure to configure XML Security for C++ securely. Even when avoiding this particular issue, any use of this library would need considerable additional code and a deep understanding of the standards and protocols involved to arrive at a secure implementation for any particular use case. We recommend against continued direct use of this library.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache XML Security Library | <=2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34580 is considered to have a moderate severity due to its potential for SSRF exploitation in vulnerable configurations.
To fix CVE-2024-34580, upgrade to Apache XML Security for C++ version 2.0.5 or later, which addresses this vulnerability.
In the context of CVE-2024-34580, SSRF refers to Server-Side Request Forgery, where an attacker can trick the server into making unauthorized requests.
CVE-2024-34580 affects all versions of Apache XML Security for C++ up to and including 2.0.4.
Apache disputes CVE-2024-34580 on the grounds that any vulnerabilities are due to improper configuration, rather than flaws in the library itself.