This document summarizes how to break XML signature and encryption. It discusses how XML security is used to secure messages at the application layer in web services. It describes attacks against XML signature wrapping used in Amazon EC2 and Eucalyptus cloud management interfaces that allow modifying signed messages. It also outlines an attack against XML encryption by checking plaintext validity and its application to CBC mode. Countermeasures are proposed.