The default configuration of the auth/saml plugin in Mahara before 1.4.2 sets the "Match username attribute to Remote username" option to false, which allows remote SAML IdP servers to spoof users of other SAML IdP servers by using the same internal username.
                
            References
                    | Link | Resource | 
|---|---|
| http://gitorious.org/mahara/mahara/commit/f07be6020e70fa8f53cd77fdcd63e7fd7ff8aaea | Patch Issue Tracking | 
| http://www.debian.org/security/2012/dsa-2467 | Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2012/05/11/9 | Mailing List Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2012/05/12/4 | Mailing List Third Party Advisory | 
| https://bugs.launchpad.net/mahara/+bug/932909 | Issue Tracking | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2012-07-12 20:55
Updated : 2016-12-07 17:43
NVD link : CVE-2012-2351
Mitre link : CVE-2012-2351
CVE.ORG link : CVE-2012-2351
JSON object : View
Products Affected
                debian
- debian_linux
 
mahara
- mahara
 
