๐Ÿ” CVE Alert

CVE-2024-34580

MEDIUM 5.3
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

Apache XML Security for C++ through 2.0.4 implements the XML Signature Syntax and Processing (XMLDsig) specification without protection against an SSRF payload in a KeyInfo element. NOTE: the project disputes this CVE Record on the grounds that any vulnerabilities are the result of a failure to configure XML Security for C++ securely. Even when avoiding this particular issue, any use of this library would need considerable additional code and a deep understanding of the standards and protocols involved to arrive at a secure implementation for any particular use case. We recommend against continued direct use of this library.

Vendor n/a
Product n/a
Published Jun 26, 2024
Last Updated Aug 8, 2024
Stay Ahead of the Next One

Get instant alerts for n/a n/a

Be the first to know when new medium vulnerabilities affecting n/a n/a are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

n/a / n/a
n/a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
santuario.apache.org: https://santuario.apache.org/download.html cloud.google.com: https://cloud.google.com/blog/topics/threat-intelligence/apache-library-allows-server-side-request-forgery sonatype.com: https://www.sonatype.com/blog/the-exploited-ivanti-connect-ssrf-vulnerability-stems-from-xmltooling-oss-library github.com: https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2024-21893.md lists.apache.org: https://lists.apache.org/thread/po2gocnw4gtf4boy5mmjb54g62qhbrl9 shibboleth.atlassian.net: https://shibboleth.atlassian.net/wiki/spaces/DEV/pages/3726671873/Santuario