blob: 9f4f92b81fee084199b2a13077dacfcde3c13a21 [file] [log] [blame]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
CVE-2015-0227: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property
Severity: Major
Vendor: The Apache Software Foundation
Versions Affected:
This vulnerability affects all versions of Apache WSS4J prior to 1.6.17 and
2.0.2.
Description:
Apache WSS4J has a "requireSignedEncryptedDataElements" boolean configuration
property, which if set enforces that EncryptedData elements are in a signed
subtree of the document. The default value of this property is "false".
However, it is possible to circumvent this setting by various types of
wrapping attacks.
This has been fixed in revision:
http://svn.apache.org/viewvc?view=revision&revision=1619359
Migration:
WSS4J 1.6.x users should upgrade to 1.6.17 or later as soon as possible.
WSS4J 2.0.x users should upgrade to 2.0.2 or later as soon as possible.
References: http://ws.apache.org/wss4j/security_advisories.html
Acknowledgments: Dennis Kupser, Christian Mainka, Juraj Somorovsky (Ruhr
University Bochum)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJU2dzcAAoJEGe/gLEK1TmD+BgIALeCz42JQvRBMV2XF2W4/WdT
7+ZSyJZM9vTOsy59FRDV2Njndsz+XL6CUbY2RtcEccir/rLHfE4pf/JLTVBZiYbr
J8eOhvXFOyJ0BR/tLrliCohofsSmQCU/XBU7aYF1I7tlaJjehubw4/8DuPGLZz+b
/og4t+2uSRujNf5Li8kxNGclx0hqpPFvEzMUGvq9+HPtPJaMLF3/b9+ns3VpfGP6
ejq6kMNgiNiigoZCw3TXZ92hjuUsVSRdOQKtv0Lq0LVZ5+5HxMk5d9LZIpWjDP9L
Li3lsXE0AxGr4NlIJF56MdaxqM9OJGBL7UaIjV0woHl9i7DhxwrBUJxF4lkX8uA=
=gNWs
-----END PGP SIGNATURE-----