Previous Topic: Changed FeaturesNext Topic: Defects Fixed in 12.52


Defects Fixed in 12.5

Protection Against XML Signature Wrapping Attacks (168095)

A malicious user can commit an XML signature wrapping attack by changing the content of a document without invalidating the signature. By default, software controls for the Policy Server and Web Agent Option Pack are set to defend against signature wrapping attacks. However, a third-party product can issue an XML document in a way that does not conform to XML specifications. As a result, the default signature checks can result in a signature verification failure.

Signature verification failures occur for the following reasons:

If a federation transaction fails, examine the smtracedefault.log file and the fwstrace.log file for a signature verification failure. These errors can indicate that the received XML document is not conforming to XML standards. As a workaround, you can disable the default Policy Server and Web Agent protection against signature wrapping attacks.

Important! If you disable the protection against signature vulnerabilities, determine another way to protect against these attacks.

To disable the XML signature wrapping checks:

  1. Navigate to the xsw.properties file. The file exists in different locations for the Policy Server and the Web Agent.
  2. Change the following xsw.properties settings to true:
  3. Save the file.

STAR issue: 21321479;1