All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Nov 2023, 03:38
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
18 Aug 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Apr 2023, 18:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:* | |
First Time |
Apache santuario Xml Security For Java
|
Information
Published : 2021-09-19 18:15
Updated : 2023-11-07 03:38
NVD link : CVE-2021-40690
Mitre link : CVE-2021-40690
JSON object : View
Products Affected
debian
- debian_linux
oracle
- weblogic_server
- peoplesoft_enterprise_peopletools
- retail_financial_integration
- communications_messaging_server
- agile_plm
- retail_bulk_data_integration
- retail_merchandising_system
- outside_in_technology
- retail_service_backbone
- commerce_guided_search
- commerce_platform
- flexcube_private_banking
- communications_diameter_intelligence_hub
- retail_integration_bus
apache
- santuario_xml_security_for_java
- tomee
- cxf
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor