Skip to main content

XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany

  • Conference paper
  • First Online:
ICT Systems Security and Privacy Protection (SEC 2021)

Abstract

XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case study. In doing so, we highlight several deficiencies in defending against XSW. Using this real-world contemporary example as motivation, we introduce a guideline for more secure XML signature processing that provides practitioners with easier access to the effective countermeasures identified in the current state of research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Because of the reduced functionality, FastXPath is also more performant.

  2. 2.

    CVE-2020-5407, CVE-2020-5390, CVE-2020-13415, CVE-2018-18689, CVE-2017-10669, CVE-2017-1000452, CVE-2016-5697, CVE-2015-3932, CVE-2015-3931, CVE-2012-6426, CVE-2012-4418, CVE-2011-1411, CVE-2011-0730.

References

  1. Bray, T., Paoli, J., Sperberg-McQueen, M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0 (Fifth Edition). Recommendation, W3C, November 2008

    Google Scholar 

  2. Eastlake, D., Reagle, J., Hirsch, F., Roessler, T.: XML Encryption Syntax and Processing Version 1.1. Recommendation, W3C, April 2013

    Google Scholar 

  3. Eastlake, D., et al.: XML Signature Syntax and Processing Version 1.1. Recommendation, W3C, April 2013

    Google Scholar 

  4. Gajek, S., Jensen, M., Liao, L., Schwenk, J.: Analysis of signature wrapping attacks and countermeasures. In: ICWS 2019. IEEE, July 2009

    Google Scholar 

  5. Gajek, S., Liao, L., Schwenk, J.: Breaking and fixing the inline approach. In: SWS 2007. ACM (2007)

    Google Scholar 

  6. gematik GmbH: Systemspezifisches Konzept ePA (2019), revision 166371

    Google Scholar 

  7. gematik GmbH: Spezifikation Authentisierung des Versicherten ePA (2020), revision 244633

    Google Scholar 

  8. gematik GmbH: Spezifikation ePA-Aktensystem (2020), revision 245464

    Google Scholar 

  9. gematik GmbH: epa - elektronische patientenakte (2019). https://www.gematik.de/fileadmin/user_upload/gematik/files/Faktenblaetter/Faktenblatt_ePA_web.pdf

  10. gematik GmbH: API Telematik, June 2020. https://fachportal.gematik.de/downloadcenter/schemata-wsdl-und-andere-dateien

  11. Gruschka, N., Lo Iacono, L.: Vulnerable cloud: SOAP message security validation revisited. In: ICWS 2009. IEEE (2009)

    Google Scholar 

  12. Gruschka, N., Luttenberger, N.: Protecting web services from DoS attacks by SOAP message validation. In: Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds.) SEC 2006. IIFIP, vol. 201, pp. 171–182. Springer, Boston, MA (2006). https://doi.org/10.1007/0-387-33406-8_15

    Chapter  Google Scholar 

  13. Gruschka, N., Luttenberger, N., Herkenhöner, R.: Event-based soap message validation for WS-securitypolicy-enriched web services. In: SWWS 2016 (2006)

    Google Scholar 

  14. Hill, B.: Complexity as enemy of security (2007). https://www.w3.org/2007/xmlsec/ws/papers/04-hill-isecpartners/

  15. Jensen, M., Gruschka, N., Herkenhoner, R., Luttenberger, N.: Soa and web services: new technologies, new standards - new attacks. In: ECOWS 2007 (2007)

    Google Scholar 

  16. Jensen, M., Gruschka, N.: A survey of attacks in the web services world. In: Electronic Services: Concepts, Methodologies, Tools and Applications (2010)

    Google Scholar 

  17. Jensen, M., Liao, L., Schwenk, J.: The curse of namespaces in the domain of XML signature. In: SWS 2009. ACM (2009)

    Google Scholar 

  18. Jensen, M., Meyer, C., Somorovsky, J., Schwenk, J.: On the effectiveness of XML schema validation for countering XML signature wrapping attacks. In: IWSSC 2011 (2011)

    Google Scholar 

  19. Jensen, M., Schwenk, J., Bohli, J.M., Gruschka, N., Lo Iacono, L.: Security prospects through cloud computing by adopting multiple clouds. In: CLOUD 2011 (2011)

    Google Scholar 

  20. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing (2009)

    Google Scholar 

  21. Mainka, C., Jensen, M., Lo Iacono, L., Schwenk, J.: XSpRES - robust and effective XML signatures for web services. In: CLOSER 2012. SciTePress (2012)

    Google Scholar 

  22. McIntosh, M., Austel, P.: XML signature element wrapping attacks and countermeasures. In: SWS 2005. Association for Computing Machinery (2005)

    Google Scholar 

  23. MITRE: Cwe-345: Insufficient verification of data authenticity (2006)

    Google Scholar 

  24. MITRE: Cwe-347: Improper verification of cryptographic signature (2006)

    Google Scholar 

  25. OASIS: Web services security: Soap message security 1.1 (2004)

    Google Scholar 

  26. Robie, J., Dyck, M., Spiegel, J.: XML Path Language (XPath) 3.1. Recommendation, W3C, March 2017

    Google Scholar 

  27. Slany, D.W.: Sicherheitsanalyse zur Sicherheit der kritischen Komponenten der elektronischen Patientenakte nach §291a SGB V, March 2020

    Google Scholar 

  28. Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., Lo Iacono, L.: All your clouds are belong to us. In: CCSW 2011 (2011)

    Google Scholar 

  29. Somorovsky, J., Mayer, A., Schwenk, J., Kampmann, M., Jensen, M.: On breaking SAML: be whoever you want to be. In: USENIX Security 2012, August 2012

    Google Scholar 

  30. W3C: SOAP 1.2-Schema (2007)

    Google Scholar 

Download references

Acknowledgement

We would like to thank our reviewers and Stephan Wiefling for their time and effort to give constructive feedback and thoughtful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul Höller .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Höller, P., Krumeich, A., Lo Iacono, L. (2021). XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany. In: Jøsang, A., Futcher, L., Hagen, J. (eds) ICT Systems Security and Privacy Protection. SEC 2021. IFIP Advances in Information and Communication Technology, vol 625. Springer, Cham. https://doi.org/10.1007/978-3-030-78120-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78120-0_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78119-4

  • Online ISBN: 978-3-030-78120-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics