An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation.
Version 2.0.0 has the fix.
The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xmldsig#hmac-sha1' entry from SignedXml.SignatureAlgorithms.
{ "github_reviewed_at": "2020-10-27T20:35:52Z", "cwe_ids": [ "CWE-287" ], "nvd_published_at": null, "severity": "HIGH", "github_reviewed": true }