CVE-2020-26290 – github.com/russellhaering/goxmldsig
Package
Manager: go
Name: github.com/russellhaering/goxmldsig
Vulnerable Version: >=0 <1.1.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.005 pctl0.64943
Details
Critical security issues in XML encoding in github.com/dexidp/dex ### Impact The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector: Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7 `encoding/xml` instabilities: - [Element namespace prefix instability (CVE-2020-29511)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md) - [Attribute namespace prefix instability (CVE-2020-29509)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md) - [Directive comment instability (CVE-2020-29510)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md) ### Patches Immediately update to [Dex v2.27.0](https://github.com/dexidp/dex/releases/tag/v2.27.0). ### Workarounds There are no known workarounds.
Metadata
Created: 2021-12-20T17:53:53Z
Modified: 2021-05-21T20:49:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-m9hp-7r99-94h5/GHSA-m9hp-7r99-94h5.json
CWE IDs: ["CWE-347"]
Alternative ID: GHSA-m9hp-7r99-94h5
Finding: F204
Auto approve: 1