CVE-2020-5390

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-5390
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-5390.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-5390
Aliases
Related
Published
2020-01-13T19:15:12Z
Modified
2024-09-18T03:11:18.597664Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.

References

Affected packages

Debian:11 / python-pysaml2

Package

Name
python-pysaml2
Purl
pkg:deb/debian/python-pysaml2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.0-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / python-pysaml2

Package

Name
python-pysaml2
Purl
pkg:deb/debian/python-pysaml2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.0-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-pysaml2

Package

Name
python-pysaml2
Purl
pkg:deb/debian/python-pysaml2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.0-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/identitypython/pysaml2

Affected ranges

Type
GIT
Repo
https://github.com/identitypython/pysaml2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.1
0.2
0.4
0.4.1
0.4.2

1.*

1.0.0
1.0.1

2.*

2.0.0
2.1.0
2.3.0
2.4.0

3.*

3.0.0

4.*

4.0.0

v1.*

v1.0.3

v2.*

v2.2.0

v3.*

v3.0.2

v4.*

v4.1.0
v4.2.0
v4.3.0
v4.4.0
v4.5.0
v4.6.0
v4.6.1
v4.6.2
v4.6.3
v4.6.4
v4.6.5
v4.7.0
v4.8.0
v4.9.0