Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5253

Опубликовано: 14 нояб. 2015
Источник: redhat
CVSS2: 4.9

Описание

The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."

It was found that Apache CXF permitted wrapping attacks in its support for SAML SSO. A malicious user could construct a SAML response that would bypass the login screen and possibly gain access to restricted information or resources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss A-MQ 6CXFNot affected
Red Hat JBoss Enterprise Application Platform 6Web ServicesWill not fix
Red Hat JBoss Fuse 6CXFAffected
Red Hat JBoss Fuse 6.2FixedRHSA-2016:032129.02.2016

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1282411apache-cxf: SAML SSO processing is vulnerable to wrapping attack

4.9 Medium

CVSS2

Связанные уязвимости

nvd
около 10 лет назад

The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."

github
больше 3 лет назад

Improper Access Control in Apache CXF

4.9 Medium

CVSS2