Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
SignXML's signature verification with HMAC is vulnerable to an algorithm confusion attack
Vulnerability Description
SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), versions of SignXML prior to 4.0.4 are vulnerable to a potential algorithm confusion attack. Unless the user explicitly limits the expected signature algorithms using the `signxml.XMLVerifier.verify(expect_config=...)` setting, an attacker may supply a signature unexpectedly signed with a key other than the provided HMAC key, using a different (asymmetric key) signature algorithm. Starting with SignXML 4.0.4, specifying `hmac_key` causes the set of accepted signature algorithms to be restricted to HMAC only, if not already restricted by the user.
CVSS Information
N/A
Vulnerability Type
认证算法的不正确实现
Vulnerability Title
SignXML 安全漏洞
Vulnerability Description
SignXML是XML-Security开源的一个Python XML签名和XAdES库。 SignXML 4.0.4之前版本存在安全漏洞,该漏洞源于算法混淆缺陷,可能导致使用非预期密钥验证签名。
CVSS Information
N/A
Vulnerability Type
N/A