Описание
Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Ссылки
- ExploitThird Party Advisory
- PatchThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Third Party AdvisoryUS Government Resource
- ExploitThird Party Advisory
- PatchThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 1.4.2 (исключая)
cpe:2.3:a:wizkunde:samlbase:*:*:*:*:*:*:*:*
EPSS
Процентиль: 45%
0.00227
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-287
CWE-347
Связанные уязвимости
EPSS
Процентиль: 45%
0.00227
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-287
CWE-347