Описание
Duo Network Gateway 1.2.9 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Ссылки
- ExploitVendor Advisory
- Third Party AdvisoryUS Government Resource
- ExploitVendor Advisory
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 1.2.9 (включая)
cpe:2.3:a:cisco:duo_network_gateway:*:*:*:*:*:*:*:*
EPSS
Процентиль: 33%
0.0013
Низкий
7.7 High
CVSS3
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-287
CWE-347
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
Duo Network Gateway 1.2.9 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
EPSS
Процентиль: 33%
0.0013
Низкий
7.7 High
CVSS3
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-287
CWE-347