Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-15216
HistorySep 29, 2020 - 12:00 a.m.

CVE-2020-15216

2020-09-2900:00:00
ubuntu.com
ubuntu.com
11
xml signatures
goxmldsig
bypassing validation
patch available

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

54.2%

In goxmldsig (XML Digital Signatures implemented in pure Go) before version
1.1.0, with a carefully crafted XML file, an attacker can completely bypass
signature validation and pass off an altered file as a signed one. A patch
is available, all users of goxmldsig should upgrade to at least revision
f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

54.2%