Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qf7v-8hj3-4xw7

Опубликовано: 06 мая 2020
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

Improper Verification of Cryptographic Signature in PySAML2

PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertions that have been signed.

Пакеты

Наименование

pysaml2

pip
Затронутые версииВерсия исправления

< 5.0.0

5.0.0

EPSS

Процентиль: 73%
0.00763
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.

CVSS3: 7.5
redhat
около 6 лет назад

PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.

CVSS3: 7.5
nvd
около 6 лет назад

PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.

CVSS3: 7.5
debian
около 6 лет назад

PySAML2 before 5.0.0 does not check that the signature in a SAML docum ...

CVSS3: 7.5
fstec
около 6 лет назад

Уязвимость библиотеки для обмена идентификационными данными по стандарту SAML2 PySAML2, связанная с некорректным подтверждением криптографической подписи данных, позволяющая нарушителю обойти проверку подписи и получить доступ к защищаемой информации

EPSS

Процентиль: 73%
0.00763
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-347