In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T13:08:22.878Z
Reserved: 2020-06-25T00:00:00
Link: CVE-2020-15216

No data.

Status : Modified
Published: 2020-09-29T16:15:11.023
Modified: 2024-11-21T05:05:06.650
Link: CVE-2020-15216
