Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11430

Опубликовано: 17 апр. 2019
Источник: debian
EPSS Низкий

Описание

OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-omniauth-samlnot-affectedpackage

Примечания

  • The change in 1.10.0 simply bumps the version requirement

  • https://github.com/omniauth/omniauth-saml/issues/156

  • https://github.com/omniauth/omniauth-saml/pull/157

  • https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations

  • https://www.kb.cert.org/vuls/id/475445

EPSS

Процентиль: 63%
0.00436
Низкий

Связанные уязвимости

CVSS3: 7.7
ubuntu
почти 7 лет назад

OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

CVSS3: 7.7
nvd
почти 7 лет назад

OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

CVSS3: 7.7
github
больше 6 лет назад

OmniAuth-SAML authentication bypass via incorrect XML canonicalization and DOM traversal

EPSS

Процентиль: 63%
0.00436
Низкий