Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
goxmldsig has validateSignature Loop Variable Capture Signature Bypass
Vulnerability Description
goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6.0, the `validateSignature` function in `validate.go` goes through the references in the `SignedInfo` block to find one that matches the signed element's ID. In Go versions before 1.22, or when `go.mod` uses an older version, there is a loop variable capture issue. The code takes the address of the loop variable `_ref` instead of its value. As a result, if more than one reference matches the ID or if the loop logic is incorrect, the `ref` pointer will always end up pointing to the last element in the `SignedInfo.References` slice after the loop. goxmlsig version 1.6.0 contains a patch.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Vulnerability Type
密码学签名的验证不恰当
Vulnerability Title
goxmldsig 安全漏洞
Vulnerability Description
goxmldsig是Russell Haering个人开发者的一个Go语言编写的数字签名库。该库继承了 SAML2.0,不需要命令行工具即可进行签名的生成和验证功能。 goxmldsig 1.6.0之前版本存在安全漏洞,该漏洞源于validateSignature函数存在循环变量捕获问题,可能导致签名验证逻辑错误。
CVSS Information
N/A
Vulnerability Type
N/A