I was reading [1] and wondered if there is either specific protections already in place in Apache Santuario's XML security implementation, or if it's up to callers of the API to make sure they use it in just the right way ?

As a concrete example, implementations maybe doing something like calling o.a.x.security.signature.XMLSignature's checkSignatuteValue() with a reference to either the SAML's X509 certificate and/or the Signature node. If the latter is being extracted with doc.getElementsByTagNameNS(SignatureSpecNS, "Signature") is this sufficient protection against the new attack ?


[1] https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations

--
*Tom Chiverton*
Lead Developer
e:      [email protected] <mailto:[email protected]>
p:      0161 817 2922
t:      @extravision <http://www.twitter.com/extravision>
w:      www.extravision.com <http://www.extravision.com/>

Extravision - email worth seeing <http://www.extravision.com/>
Registered in the UK at: First floor, Tomorrow, MediaCityUK, Manchester, M50 2AB.
Company Reg No: 0‌‌5017214 VAT: GB 8‌‌24 5386 19

This e-mail is intended solely for the person to whom it is addressed and may contain confidential or privileged information. Any views or opinions presented in this e-mail are solely of the author and do not necessarily represent those of Extravision Ltd.

Reply via email to