Skip to content

Commit 14d0da1

Browse files
committed
data/reports: add GO-2023-1826.yaml
Aliases: CVE-2023-34205, GHSA-jqvr-j2vg-gjrv Fixes #1826 Change-Id: I606c4425b89f584061139bd6c4e87a81d45b49b5 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/501937 Run-TryBot: Damien Neil <[email protected]> Reviewed-by: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]>
1 parent a674883 commit 14d0da1

File tree

2 files changed

+82
-0
lines changed

2 files changed

+82
-0
lines changed

data/osv/GO-2023-1826.json

+51
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2023-1826",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2023-34205",
8+
"GHSA-jqvr-j2vg-gjrv"
9+
],
10+
"details": "Signature validation canonicalizes the input XML document before validating the signature. Parsing the uncanonicalized and canonicalized forms can produce different results. An attacker can exploit this variation to bypass signature validation.\n\nUsers of signature validation must only parse the canonicalized form of the validated document. The Validator.Validate function does not return the canonical form, and cannot be used safely. Users should only use the Validator.ValidateReferences function and only parse the canonical form which it returns.\n\nThe Validator.Validate function was removed in github.com/moov-io/signedxml v1.1.0.",
11+
"affected": [
12+
{
13+
"package": {
14+
"name": "github.com/moov-io/signedxml",
15+
"ecosystem": "Go"
16+
},
17+
"ranges": [
18+
{
19+
"type": "SEMVER",
20+
"events": [
21+
{
22+
"introduced": "0"
23+
},
24+
{
25+
"fixed": "1.1.0"
26+
}
27+
]
28+
}
29+
],
30+
"ecosystem_specific": {
31+
"imports": [
32+
{
33+
"path": "github.com/moov-io/signedxml",
34+
"symbols": [
35+
"Validator.Validate"
36+
]
37+
}
38+
]
39+
}
40+
}
41+
],
42+
"references": [
43+
{
44+
"type": "REPORT",
45+
"url": "https://github.com/moov-io/signedxml/issues/23"
46+
}
47+
],
48+
"database_specific": {
49+
"url": "https://pkg.go.dev/vuln/GO-2023-1826"
50+
}
51+
}

data/reports/GO-2023-1826.yaml

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
id: GO-2023-1826
2+
modules:
3+
- module: github.com/moov-io/signedxml
4+
versions:
5+
- fixed: 1.1.0
6+
vulnerable_at: 1.0.0
7+
packages:
8+
- package: github.com/moov-io/signedxml
9+
symbols:
10+
- Validator.Validate
11+
summary: Signature validation bypass in github.com/moov-io/signedxml
12+
description: |
13+
Signature validation canonicalizes the input XML document before validating
14+
the signature. Parsing the uncanonicalized and canonicalized forms can
15+
produce different results. An attacker can exploit this variation to
16+
bypass signature validation.
17+
18+
Users of signature validation must only parse the canonicalized form of the
19+
validated document. The Validator.Validate function does not return the
20+
canonical form, and cannot be used safely. Users should only use the
21+
Validator.ValidateReferences function and only parse the canonical form
22+
which it returns.
23+
24+
The Validator.Validate function was removed in
25+
github.com/moov-io/signedxml v1.1.0.
26+
cves:
27+
- CVE-2023-34205
28+
ghsas:
29+
- GHSA-jqvr-j2vg-gjrv
30+
references:
31+
- report: https://github.com/moov-io/signedxml/issues/23

0 commit comments

Comments
 (0)