Executive Summary

Informations
NameCVE-2017-11427First vendor Publication2019-04-17
VendorCveLast vendor Modification2019-04-18

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11427

CWE : Common Weakness Enumeration

%idName
100 %CWE-287Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Sources (Detail)

SourceUrl
MISC https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implem...
https://www.kb.cert.org/vuls/id/475445

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-04-18 21:19:02
  • Multiple Updates
2019-04-17 21:19:19
  • First insertion