In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1160 | In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0 |
Github GHSA |
GHSA-q547-gmf8-8jr7 | github.com/russellhaering/goxmldsig vulnerable to Signature Validation Bypass |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T13:08:22.878Z
Reserved: 2020-06-25T00:00:00
Link: CVE-2020-15216
No data.
Status : Modified
Published: 2020-09-29T16:15:11.023
Modified: 2024-11-21T05:05:06.650
Link: CVE-2020-15216
OpenCVE Enrichment
No data.
EUVD
Github GHSA