pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
References
Link | Resource |
---|---|
https://github.com/rohe/pysaml2/issues/451 | Patch Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201801-11 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-01-02 23:29
Updated : 2021-03-04 21:16
NVD link : CVE-2017-1000433
Mitre link : CVE-2017-1000433
CVE.ORG link : CVE-2017-1000433
JSON object : View
Products Affected
debian
- debian_linux
pysaml2_project
- pysaml2
CWE
CWE-287
Improper Authentication