Skip to content

github.com/russellhaering/goxmldsig vulnerable to Signature Validation Bypass

Moderate severity GitHub Reviewed Published Sep 29, 2020 in russellhaering/goxmldsig • Updated Aug 29, 2023

Package

gomod github.com/russellhaering/goxmldsig (Go)

Affected versions

< 1.1.0

Patched versions

1.1.0

Description

Impact

With a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one.

Patches

A patch is available, all users of goxmldsig should upgrade to v1.1.0.

For more information

If you have any questions or comments about this advisory open an issue at https://github.com/russellhaering/goxmldsig

References

@russellhaering russellhaering published to russellhaering/goxmldsig Sep 29, 2020
Published by the National Vulnerability Database Sep 29, 2020
Reviewed May 24, 2021
Published to the GitHub Advisory Database May 24, 2021
Last updated Aug 29, 2023

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2020-15216

GHSA ID

GHSA-q547-gmf8-8jr7

Source code

No known source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.