Rob Richards XmlSecLibs up to 3.0.2 Signature XML Message spoofing – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on November 8th, 2019 📆 | 5874 Views ⚑


Rob Richards XmlSecLibs up to 3.0.2 Signature XML Message spoofing

CVSS Meta Temp ScoreCurrent Exploit Price (≈)CTI Interest Score

A vulnerability has been found in Rob Richards XmlSecLibs up to 3.0.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Signature Handler. The manipulation as part of a XML Message leads to a spoofing vulnerability. The CWE definition for the vulnerability is CWE-290. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was disclosed 11/07/2019 as mailinglist post (Bugtraq). The advisory is shared at This vulnerability is known as CVE-2019-3465 since 12/31/2018. A single authentication is required for exploitation. Neither technical details nor an exploit are publicly available.

Upgrading to version 3.0.3 eliminates this vulnerability.



VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Spoofing (CWE-290)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: XmlSecLibs 3.0.3

12/31/2018 CVE assigned
11/07/2019 +311 days Advisory disclosed
11/08/2019 +1 days VulDB entry created
11/08/2019 +0 days VulDB last updateAdvisory:

CVE: CVE-2019-3465 (🔒)

Created: 11/08/2019 01:01 PM
Complete: 🔍

Download the whitepaper to learn more about our service!

Tagged with:

Leave a Reply ✍