CVE-2020-15216 — Improper Verification of Cryptographic Signature in Goxmldsig
Severity
6.5MEDIUMNVD
CNA5.3GHSA5.3
EPSS
0.2%
top 56.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 29
Latest updateDec 20
Description
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages3 packages
Also affects: Fedora 32, 33
Patches
🔴Vulnerability Details
6OSV▶
CVE-2020-15216: In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1↗2020-09-29