In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
2019-08-23T21:15:11.490
2024-11-21T04:22:45.690
Modified
CVSSv3.1: 5.5 (MEDIUM)
AV:L/AC:M/Au:N/C:N/I:P/A:N
3.4
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | santuario_xml_security_for_java | ≤ 2.0.10 | Yes |
Application | apache | santuario_xml_security_for_java | < 2.1.4 | Yes |
Application | redhat | jboss_enterprise_application_platform | 7.2 | Yes |
Application | oracle | weblogic_server | 12.2.1.4.0 | Yes |
Application | oracle | weblogic_server | 14.1.1.0.0 | Yes |