All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2021-09-19 18:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40690
Mitre link : CVE-2021-40690
CVE.ORG link : CVE-2021-40690
JSON object : View
Products Affected
oracle
- retail_merchandising_system
- retail_integration_bus
- communications_messaging_server
- peoplesoft_enterprise_peopletools
- communications_diameter_intelligence_hub
- retail_bulk_data_integration
- retail_service_backbone
- outside_in_technology
- weblogic_server
- retail_financial_integration
- agile_plm
- commerce_platform
- flexcube_private_banking
- commerce_guided_search
apache
- cxf
- santuario_xml_security_for_java
- tomee
debian
- debian_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor