In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1572 | In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW). |
Github GHSA |
GHSA-jqvr-j2vg-gjrv | Signature validation bypass in github.com/moov-io/signedxml |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/moov-io/signedxml/issues/23 |
|
History
Fri, 10 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-10T21:21:48.155Z
Reserved: 2023-05-30T00:00:00
Link: CVE-2023-34205
Updated: 2024-08-02T16:01:54.251Z
Status : Modified
Published: 2023-05-30T04:15:10.377
Modified: 2025-01-10T22:15:25.167
Link: CVE-2023-34205
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA