In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1160 In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
Github GHSA Github GHSA GHSA-q547-gmf8-8jr7 github.com/russellhaering/goxmldsig vulnerable to Signature Validation Bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:08:22.878Z

Reserved: 2020-06-25T00:00:00

Link: CVE-2020-15216

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-29T16:15:11.023

Modified: 2024-11-21T05:05:06.650

Link: CVE-2020-15216

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-09-30T00:00:00Z

Links: CVE-2020-15216 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses