CVE-2020-15216Improper Verification of Cryptographic Signature in Goxmldsig

Severity
6.5MEDIUMNVD
CNA5.3GHSA5.3
EPSS
0.2%
top 56.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 29
Latest updateDec 20

Description

In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

Also affects: Fedora 32, 33

Patches

🔴Vulnerability Details

6
GHSA
Critical security issues in XML encoding in github.com/dexidp/dex2021-12-20
OSV
github.com/russellhaering/goxmldsig vulnerable to Signature Validation Bypass2021-05-24
GHSA
github.com/russellhaering/goxmldsig vulnerable to Signature Validation Bypass2021-05-24
OSV
XML digital signature validation bypass in github.com/russellhaering/goxmldsig2021-04-14
OSV
CVE-2020-15216: In goxmldsig (XML Digital Signatures implemented in pure Go) before version 12020-09-29

📋Vendor Advisories

2
Red Hat
goxmldsig: carefully crafted XML file could allow to bypass signature validation2020-09-30
Debian
CVE-2020-15216: golang-github-russellhaering-goxmldsig - In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1....2020

💬Community

2
Bugzilla
CVE-2020-15216 goxmldsig: carefully crafted XML file could allow to bypass signature validation2020-10-01
Bugzilla
CVE-2020-15216 golang-github-russellhaering-goxmldsig: goxmldsig: carefully crafted XML file could allow to bypass signature validation [fedora-all]2020-10-01
CVE-2020-15216 — Russellhaering Goxmldsig vulnerability | cvebase