XML Signature Element Wrapping Attacks and Countermeasures

Nave use of XML Signature may result in signed documents remaining vulnerable to undetected modification by an adversary. In the typical usage of XML Signature to protect SOAP messages, an adversary may be capable of modifying valid messages in order to gain unauthorized access to protected resources. This paper describes the general vulnerability and several related exploits, and proposes appropriate countermeasures. While the attacks described herein may seem obvious to security experts once they are explained, effective countermeasures require careful security policy specification and correct implementation by signed message providers and consumers. Since these implementers are not always security experts, this paper provides the guidance necessary to prevent these attacks.

By: Michael McIntosh Paula Austel

Published in: RC23691 in 2005

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc23691.pdf

Questions about this service can be mailed to reports@us.ibm.com .