Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15216
HistorySep 29, 2020 - 4:00 p.m.

CVE-2020-15216 Signature Validation Bypass in goxmldsig

2020-09-2916:00:18
CWE-347
GitHub_M
www.cve.org
5
xml digital signatures
signature validation bypass
goxmldsig
cve-2020-15216
pure go
patch available

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

6.6

Confidence

High

EPSS

0.002

Percentile

54.2%

In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0

CNA Affected

[
  {
    "product": "goxmldsig",
    "vendor": "russellhaering",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.1.0"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

6.6

Confidence

High

EPSS

0.002

Percentile

54.2%