Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14ZnJqLTZ2dmMtM3htMs4AA2mS
Apache Santuario - XML Security for Java are vulnerable to private key disclosure
All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled. Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.
Permalink: https://github.com/advisories/GHSA-xfrj-6vvc-3xm2JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14ZnJqLTZ2dmMtM3htMs4AA2mS
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Percentage: 0.00095
EPSS Percentile: 0.41534
Identifiers: GHSA-xfrj-6vvc-3xm2, CVE-2023-44483
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-44483
- https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55
- https://santuario.apache.org/secadv.data/CVE-2023-44483.txt.asc?version=1&modificationDate=1697782758000&api=v2
- http://www.openwall.com/lists/oss-security/2023/10/20/5
- https://github.com/advisories/GHSA-xfrj-6vvc-3xm2
Affected Packages
maven:org.apache.santuario:xmlsec
Dependent packages: 352Dependent repositories: 2,584
Downloads:
Affected Version Ranges: >= 3.0.0, < 3.0.3, < 2.2.6, >= 2.3.0, < 2.3.4
Fixed in: 3.0.3, 2.2.6, 2.3.4
All affected versions: 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.4.7, 1.4.8, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6, 1.5.7, 1.5.8, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 3.0.0, 3.0.1, 3.0.2
All unaffected versions: 2.2.6, 2.3.4, 3.0.3, 3.0.4, 3.0.5, 4.0.0, 4.0.1, 4.0.2, 4.0.3