Description
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1160 | In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0 |
Github GHSA |
GHSA-q547-gmf8-8jr7 | github.com/russellhaering/goxmldsig vulnerable to Signature Validation Bypass |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T13:08:22.878Z
Reserved: 2020-06-25T00:00:00.000Z
Link: CVE-2020-15216
No data.
Status : Modified
Published: 2020-09-29T16:15:11.023
Modified: 2024-11-21T05:05:06.650
Link: CVE-2020-15216
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA