In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2019-08-23 21:15
Updated : 2023-11-07 03:03
NVD link : CVE-2019-12400
Mitre link : CVE-2019-12400
CVE.ORG link : CVE-2019-12400
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
oracle
- weblogic_server
apache
- santuario_xml_security_for_java
CWE
CWE-20
Improper Input Validation