blob: 6320b66bdf219c49ed02cd6812a2aa5dbd9c058a [file] [log] [blame]
{
"schema_version": "1.3.1",
"id": "GO-2023-1826",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-34205",
"GHSA-jqvr-j2vg-gjrv"
],
"summary": "Signature validation bypass in github.com/moov-io/signedxml",
"details": "Signature validation canonicalizes the input XML document before validating the signature. Parsing the uncanonicalized and canonicalized forms can produce different results. An attacker can exploit this variation to bypass signature validation.\n\nUsers of signature validation must only parse the canonicalized form of the validated document. The Validator.Validate function does not return the canonical form, and cannot be used safely. Users should only use the Validator.ValidateReferences function and only parse the canonical form which it returns.\n\nThe Validator.Validate function was removed in github.com/moov-io/signedxml v1.1.0.",
"affected": [
{
"package": {
"name": "github.com/moov-io/signedxml",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/moov-io/signedxml",
"symbols": [
"Validator.Validate"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://github.com/moov-io/signedxml/issues/23"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1826"
}
}