Description
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
Remediation
References
Related Vulnerabilities
Jboss EAP Insertion of Sensitive Information into Log File Vulnerability (CVE-2019-10212)
Drupal Core Cross-Site Scripting (8.0.0 - 9.1.15)
Sqlite NULL Pointer Dereference Vulnerability (CVE-2019-19242)
Dotclear Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-3232)
WordPress Plugin Easy Registration Forms Unspecified Vulnerability (1.8.4)