// For flags

CVE-2013-2172

Java: XML signature spoofing

Severity Score

4.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."

jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java en Apache Santuario XML Security para Java 1.4.x anterior a 1.4.8 y 1.5.x anterior a 1.5.5 , permite a atacantes dependientes del contexto suplantar una firma XML utilizando el parámetro "CanonicalizationMethod" para especificar la debilidad arbitraria: "canonización del algoritmo a aplicar para la parte SignedInfo de la firma".

A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially crafted XML signature block.

Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This roll up patch serves as a cumulative upgrade for Red Hat JBoss BRMS 5.3.1. It includes various bug fixes. The following security issue is also fixed with this release: A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially-crafted XML signature block.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-02-19 CVE Reserved
  • 2013-08-20 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-290: Authentication Bypass by Spoofing
  • CWE-310: Cryptographic Issues
CAPEC
References (26)
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Santuario Xml Security For Java
Search vendor "Apache" for product "Santuario Xml Security For Java"
1.4.7
Search vendor "Apache" for product "Santuario Xml Security For Java" and version "1.4.7"
-
Affected
Apache
Search vendor "Apache"
Santuario Xml Security For Java
Search vendor "Apache" for product "Santuario Xml Security For Java"
1.5.0
Search vendor "Apache" for product "Santuario Xml Security For Java" and version "1.5.0"
-
Affected
Apache
Search vendor "Apache"
Santuario Xml Security For Java
Search vendor "Apache" for product "Santuario Xml Security For Java"
1.5.1
Search vendor "Apache" for product "Santuario Xml Security For Java" and version "1.5.1"
-
Affected
Apache
Search vendor "Apache"
Santuario Xml Security For Java
Search vendor "Apache" for product "Santuario Xml Security For Java"
1.5.2
Search vendor "Apache" for product "Santuario Xml Security For Java" and version "1.5.2"
-
Affected
Apache
Search vendor "Apache"
Santuario Xml Security For Java
Search vendor "Apache" for product "Santuario Xml Security For Java"
1.5.3
Search vendor "Apache" for product "Santuario Xml Security For Java" and version "1.5.3"
-
Affected
Apache
Search vendor "Apache"
Santuario Xml Security For Java
Search vendor "Apache" for product "Santuario Xml Security For Java"
1.5.4
Search vendor "Apache" for product "Santuario Xml Security For Java" and version "1.5.4"
-
Affected