include::../description.adoc[] == Noncompliant Code Example [source,java] ---- NodeList signatureElement = doc.getElementsByTagNameNS(XMLSignature.XMLNS, "Signature"); XMLSignatureFactory fac = XMLSignatureFactory.getInstance("DOM"); DOMValidateContext valContext = new DOMValidateContext(new KeyValueKeySelector(), signatureElement.item(0)); // Noncompliant XMLSignature signature = fac.unmarshalXMLSignature(valContext); boolean signatureValidity = signature.validate(valContext); ---- == Compliant Solution In order to benefit from this secure validation mode, set the DOMValidateContext's ``org.jcp.xml.dsig.secureValidation`` property to ``TRUE``. [source,java] ---- NodeList signatureElement = doc.getElementsByTagNameNS(XMLSignature.XMLNS, "Signature"); XMLSignatureFactory fac = XMLSignatureFactory.getInstance("DOM"); DOMValidateContext valContext = new DOMValidateContext(new KeyValueKeySelector(), signatureElement.item(0)); valContext.setProperty("org.jcp.xml.dsig.secureValidation", Boolean.TRUE); XMLSignature signature = fac.unmarshalXMLSignature(valContext); boolean signatureValidity = signature.validate(valContext); ---- == See * https://docs.oracle.com/en/java/javase/14/security/java-xml-digital-signature-api-overview-and-tutorial.html#GUID-DB46A001-6DBD-4571-BDBC-1BBC394BF61E[Oracle Java Documentation] - XML Digital Signature API Overview and Tutorial * https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure[OWASP Top 10 2017 Category A3] - Sensitive Data Exposure * https://cwe.mitre.org/data/definitions/347[MITRE, CWE-347] - Improper Verification of Cryptographic Signature ifdef::env-github,rspecator-view[] ''' == Implementation Specification (visible only on this page) include::../message.adoc[] ''' == Comments And Links (visible only on this page) include::../comments-and-links.adoc[] endif::env-github,rspecator-view[]