logo

CVE-2020-5390 pysaml2

Package

Manager: pip
Name: pysaml2
Vulnerable Version: >=0 <5.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00665 pctl0.70331

Details

Improper Verification of Cryptographic Signature in PySAML2 PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertions that have been signed.

Metadata

Created: 2020-05-06T19:41:29Z
Modified: 2024-10-23T15:55:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/05/GHSA-qf7v-8hj3-4xw7/GHSA-qf7v-8hj3-4xw7.json
CWE IDs: ["CWE-347"]
Alternative ID: GHSA-qf7v-8hj3-4xw7
Finding: F163
Auto approve: 1