In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario – XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario – XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
View Full Alert
Related Posts
CVE-2019-1903 (security_manager)A vulnerability in Cisco Security Manager could allow an unauthenticated, remote attacker to access sensitive information or cause a denial of service (DoS) condition. The vulnerability is due to improper…
CVE-2019-1905 (email_security_appliance)A vulnerability in the GZIP decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the…
CVE-2019-11269 (spring_security_oauth)Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible…