CVE-2013-2153
20.08.2013, 22:55
The XML digital signature functionality (xsec/dsig/DSIGReference.cpp) in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 allows context-dependent attackers to reuse signatures and spoof arbitrary content via crafted Reference elements in the Signature, aka "XML Signature Bypass issue."Enginsight
Vendor | Product | Version |
---|---|---|
apache | xml_security_for_c\+\+ | 𝑥 ≤ 1.7.0 |
apache | xml_security_for_c\+\+ | 0.1.0 |
apache | xml_security_for_c\+\+ | 0.2.0 |
apache | xml_security_for_c\+\+ | 1.1.0 |
apache | xml_security_for_c\+\+ | 1.2.0 |
apache | xml_security_for_c\+\+ | 1.2.1 |
apache | xml_security_for_c\+\+ | 1.3.0 |
apache | xml_security_for_c\+\+ | 1.3.1 |
apache | xml_security_for_c\+\+ | 1.4.0 |
apache | xml_security_for_c\+\+ | 1.5.0 |
apache | xml_security_for_c\+\+ | 1.5.1 |
apache | xml_security_for_c\+\+ | 1.6.0 |
apache | xml_security_for_c\+\+ | 1.6.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References