Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f4g9-h89h-jgv9

Опубликовано: 21 янв. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

SAML XML Signature wrapping in PySAML2

Impact

All users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. pysaml2 <= 6.4.1 does not validate the SAML document against an XML schema. This allows invalid XML documents to trick the verification process, by presenting elements with a valid signature inside elements whose content has been malformed. The verification is offloaded to xmlsec1 and xmlsec1 will not validate every signature in the given document, but only the first it finds in the given scope.

Patches

Users should upgrade to pysaml2 v6.5.0.

Workarounds

No workaround provided at this point.

References

No references provided at this point.

Credits

  • Victor Schönfelder Garcia (isits AG International School of IT Security)
  • Juraj Somorovsky (Paderborn University)
  • Vladislav Mladenov (Ruhr University Bochum)

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

pysaml2

pip
Затронутые версииВерсия исправления

< 6.5.0

6.5.0

EPSS

Процентиль: 35%
0.0014
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 4 лет назад

PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping because it did not validate the SAML document against an XML schema. This allowed invalid XML documents to be processed and such a document can trick pysaml2 with a wrapped signature. This is fixed in PySAML2 6.5.0.

CVSS3: 6.5
redhat
больше 4 лет назад

PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping because it did not validate the SAML document against an XML schema. This allowed invalid XML documents to be processed and such a document can trick pysaml2 with a wrapped signature. This is fixed in PySAML2 6.5.0.

CVSS3: 6.5
nvd
больше 4 лет назад

PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping because it did not validate the SAML document against an XML schema. This allowed invalid XML documents to be processed and such a document can trick pysaml2 with a wrapped signature. This is fixed in PySAML2 6.5.0.

CVSS3: 6.5
debian
больше 4 лет назад

PySAML2 is a pure python implementation of SAML Version 2 Standard. Py ...

CVSS3: 6.5
redos
около 1 года назад

Уязвимость python3-pysaml2

EPSS

Процентиль: 35%
0.0014
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-347