Description
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
Published: 2020-09-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-1160 In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
Github GHSA Github GHSA GHSA-q547-gmf8-8jr7 github.com/russellhaering/goxmldsig vulnerable to Signature Validation Bypass
History

No history.

Subscriptions

Fedoraproject Fedora
Goxmldsig Project Goxmldsig
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:08:22.878Z

Reserved: 2020-06-25T00:00:00.000Z

Link: CVE-2020-15216

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-29T16:15:11.023

Modified: 2024-11-21T05:05:06.650

Link: CVE-2020-15216

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-09-30T00:00:00Z

Links: CVE-2020-15216 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses