A jar is now available for testing: http://people.apache.org/~mullan/dist/xmlsec-1.4.3beta1.jar

Here is a complete list of what bugs have been fixed:

    Fixed Bug 47526: XML signature HMAC truncation authentication bypass
    Fixed Bug 47525: Fix checkstyle problems with source and tests.
    Fixed Bug 42239: ECDSA signature value interopability patch.
    Fixed Bug 45744: XPath transform and xml-stylesheet.
    Fixed Bug 42986: The </#document> node inserted at the end of SOAPEnvelope.
    Fixed Bug 47029: Unnecessary namespace declarations on EncryptedData childre
n.
    Fixed Bug 44335: Can't validate after invalid validation.
    Fixed Bug 47260: Improve Java unit testing.
    Fixed Bug 47265: Some website updates.
    Fixed Bug 45388: We need a POM file added to the Maven repository.
    Fixed Bug 47483: Remove JDK 1.5 API dependencies
    Fixed bug 47057: Downgrade signature verification logging from "info". Thank
s to Colm O hEigeartaigh.
    Fixed bug 42061: Method to disable XMLUtils.addReturnToElement (reopened): c
hanged Base64 code to ignore line breaks, if enabled. Thanks to Colm O hEigearta
igh.
    Fixed bug 47097: Reusing XMLSignature for signing and verifying fails on sam
e thread. Thanks to Bruno Harbulot.
    Fixed bug 46732: Failed to add more than one child element to EncryptionMeth
od.
    Fixed bug 46101: org.apache.xml.security.utils.IdResolver is not thread safe
    Fixed bug 45961: verify with own canonicalization method. Thanks to Anton Ko
syakov.
    Fixed bug 45475: XMLSignature::getKeyInfo method modifies document
    Fixed bug 45811: Fix XMLSec 1.4.2 problems reported by findbugs
    Fixed bug 45706: Transform.register class loading and recursive instantiatio
n problems
    Fixed bug 45664: Some calls should be wrapped in AccessController.doPrivileg
ed
    Fixed bug 45634: Restore XMLUtils.createDSctx method.
    Fixed bug 45095: log4j.properties in xmlsec sources and builds has side
effects in production environment. Thanks to Joachim Rousseau.






Sean Mullan wrote:
Hi all,

I have just putback a fix for this vulnerability to the source code repository. This patch will be included in the (Java) version 1.4.3 release. Because of the potential severity of this issue, we are planning an expedited release process for 1.4.3. I plan to make available a jar for testing later today and a more complete release candidate binary tomorrow. If no issues are found then we will call for a vote later this week and work towards making a final version available early next week.

Thanks,
Sean

bugzi...@apache.org wrote:
https://issues.apache.org/bugzilla/show_bug.cgi?id=47526

           Summary: XML signature HMAC truncation authentication bypass
           Product: Security
           Version: Java 1.4.2
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: critical
          Priority: P1
         Component: Signature
        AssignedTo: security-dev@xml.apache.org
        ReportedBy: sean.mul...@sun.com


Apache XML Security (Java) is affected by the vulnerability published in
US-Cert VU #466161. See: http://www.kb.cert.org/vuls/id/466161 for more
information. This bug can allow an attacker to bypass authentication by
inserting/modifying a small HMAC truncation length parameter in the XML
Signature HMAC based SignatureMethod algorithms.



Reply via email to