logo

CVE-2019-12400 org.apache.santuario:xmlsec

Package

Manager: maven
Name: org.apache.santuario:xmlsec
Vulnerable Version: >=2.0.3 <2.1.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00317 pctl0.54142

Details

Improper input validation in Apache Santuario XML Security for Java In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.

Metadata

Created: 2019-08-27T17:41:33Z
Modified: 2021-08-17T22:16:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/08/GHSA-4q98-wr72-h35w/GHSA-4q98-wr72-h35w.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-4q98-wr72-h35w
Finding: F184
Auto approve: 1