Lucene search

K
redhatcveRedhat.comRH:CVE-2024-32962
HistoryMay 03, 2024 - 6:22 a.m.

CVE-2024-32962

2024-05-0306:22:59
redhat.com
access.redhat.com
43
flaw
xml-crypto
authorization checks
spoofed signature
malicious actions
xml payload
certificate
validation checks

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

9.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

A flaw was found in xml-crypto, where the default configuration lacks authorization checks for signers, only checking the signature’s validity. This flaw allows malicious actors to pass a manipulated XML payload to instances of xml-crypto. By re-signing an XML document with a malicious private key and inserting the corresponding certificate into a element, attackers can deceive xml-crypto’s default validation checks, thus allowing spoofed signature verification and potentially facilitating the execution of malicious actions.

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

9.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

Related for RH:CVE-2024-32962