All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.

Project Subscriptions

Vendors Products
Santuario Xml Security For Java Subscribe
Debian Linux Subscribe
Agile Plm Subscribe
Commerce Guided Search Subscribe
Commerce Platform Subscribe
Communications Diameter Intelligence Hub Subscribe
Communications Messaging Server Subscribe
Flexcube Private Banking Subscribe
Outside In Technology Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Retail Bulk Data Integration Subscribe
Retail Financial Integration Subscribe
Retail Integration Bus Subscribe
Retail Merchandising System Subscribe
Retail Service Backbone Subscribe
Weblogic Server Subscribe
Camel Quarkus Subscribe
Integration Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Fuse Subscribe
Jbosseapxp Subscribe
Red Hat Single Sign On Subscribe
Rhosemc Subscribe
Service Registry Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2767-1 libxml-security-java security update
Debian DSA Debian DSA DSA-5010-1 libxml-security-java security update
EUVD EUVD EUVD-2021-2083 All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
Github GHSA Github GHSA GHSA-j8wc-gxx9-82hx Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario
Ubuntu USN Ubuntu USN USN-5525-1 Apache XML Security for Java vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59%40%3Cissues.cxf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E cve-icon cve-icon cve-icon
https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8%40%3Cuser.poi.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-40690 cve-icon
https://security.netapp.com/advisory/ntap-20230818-0002/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-40690 cve-icon
https://www.debian.org/security/2021/dsa-5010 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2022.html cve-icon cve-icon
History

Mon, 28 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T02:51:06.487Z

Reserved: 2021-09-08T00:00:00

Link: CVE-2021-40690

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-19T18:15:07.223

Modified: 2024-11-21T06:24:34.267

Link: CVE-2021-40690

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-09-17T00:00:00Z

Links: CVE-2021-40690 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses