| Vulnerability Name: | CVE-2021-40690 (CCN-209586) | ||||||||||||
| Assigned: | 2021-09-17 | ||||||||||||
| Published: | 2021-09-17 | ||||||||||||
| Updated: | 2023-04-28 | ||||||||||||
| Summary: | Apache Santuario XML Security for Java could allow a remote attacker to bypass security restrictions, caused by the improper passing of the "secureValidation" property when creating a KeyInfo from a KeyInfoReference element. An attacker could exploit this vulnerability to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-40690 Source: XF Type: UNKNOWN apache-santuario-cve202140690-sec-bypass(209586) Source: security@apache.org Type: Exploit, Issue Tracking, Mailing List, Patch, Third Party Advisory security@apache.org Source: security@apache.org Type: Mailing List, Third Party Advisory security@apache.org Source: CCN Type: Apache Mailing List, 2021/09/17 10:03:48 Apache Santuario - XML Security for Java Source: security@apache.org Type: Issue Tracking, Mailing List, Patch, Third Party Advisory security@apache.org Source: security@apache.org Type: Issue Tracking, Mailing List, Patch, Third Party Advisory security@apache.org Source: security@apache.org Type: Issue Tracking, Mailing List, Patch, Third Party Advisory security@apache.org Source: security@apache.org Type: Exploit, Issue Tracking, Mailing List, Patch, Third Party Advisory security@apache.org Source: security@apache.org Type: Mailing List, Third Party Advisory security@apache.org Source: security@apache.org Type: Issue Tracking, Mailing List, Patch, Third Party Advisory security@apache.org Source: security@apache.org Type: Issue Tracking, Mailing List, Patch, Third Party Advisory security@apache.org Source: security@apache.org Type: Mailing List, Third Party Advisory security@apache.org Source: CCN Type: oss-sec Mailing List, Fri, 17 Sep 2021 11:07:19 +0100 CVE-2021-40690: Apache Santuario: Bypass of the secureValidation property Source: security@apache.org Type: Third Party Advisory security@apache.org Source: CCN Type: IBM Security Bulletin 6519472 (Curam Social Program Management) Vulnerability in Apache Santuario XML Security for Java may affect Curam Social Program Management (CVE-2021-40690) Source: CCN Type: IBM Security Bulletin 6568219 (Tivoli Netcool/Impact) IBM Tivoli Netcool Impact vulnerable to security bypass due to Apache Santuario XML Security (CVE-2021-40690) Source: CCN Type: IBM Security Bulletin 6570915 (Data Risk Manager) IBM Data Risk Manager is affected by multiple vulnerabilities including a remote code execution in Spring Framework (CVE-2022-22965) Source: CCN Type: IBM Security Bulletin 6621617 (Planning Analytics Workspace) IBM Planning Analytics Workspace is affected by multiple vulnerabilities (CVE-2021-40690, CVE-2021-25647, XFID: 233967) Source: CCN Type: IBM Security Bulletin 6826621 (Tivoli Business Service Manager) A vulnerability in Apache XML Security for Java affects IBM Tivoli Business Service Manager (CVE-2013-4517, CVE-2013-2172, CVE-2009-0217, CVE-2021-40690) Source: CCN Type: IBM Security Bulletin 6829363 (InfoSphere Information Server) Multiple vulnerabilities in Apache Santuario XML Security for Java affect IBM InfoSphere Information Server Source: CCN Type: IBM Security Bulletin 6836921 (Security Verify Governance) IBM Security Verify Governance is vulnerable to bypassing of security restrictions due to use of Apache Santuario XML Security (CVE-2019-12400, CVE-2021-40690) Source: CCN Type: Oracle CPUApr2022 Oracle Critical Patch Update Advisory - April 2022 Source: security@apache.org Type: Patch, Third Party Advisory security@apache.org Source: CCN Type: Oracle CPUJul2022 Oracle Critical Patch Update Advisory - July 2022 Source: security@apache.org Type: Patch, Third Party Advisory security@apache.org | ||||||||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| Oval Definitions | |||||||||||||
| |||||||||||||
| BACK | |||||||||||||