CVE-2019-3465:
Signature validation bypass in XmlSecLibs
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.87507%
CWE
Published
11/8/2019
Updated
2/6/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
robrichards/xmlseclibs | composer | >= 3.0.0, < 3.0.4 | 3.0.4 |
robrichards/xmlseclibs | composer | >= 1.0.0, < 2.1.1 | 2.1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper handling of multiple SignedInfo
/Reference
elements in XML signatures. The commit 0a53d3c
introduced fixes: 1) Added checks for multiple SignedInfo
elements in locateSignature/canonicalizeSignedInfo
, 2) Modified XPath queries in getRefIDs/validateReference
to explicitly select the first SignedInfo
([1]). These changes indicate the original functions lacked proper validation
, allowing attackers to craft XML with multiple SignedInfo
blocks to bypass signature checks. The high confidence comes from direct correlation between the patch's logic and the CVE description of signature validation
bypass.