Show filters
109 Total Results
Displaying 61-70 of 109
Sort by:
Attacker Value
Unknown
Log injection in SimpleSAMLphp
Disclosure Date: January 24, 2020 (last updated February 21, 2025)
Log injection in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the file logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the reportID parameter received in a request sent to www/errorreport.php was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content.
0
Attacker Value
Unknown
CVE-2020-5390
Disclosure Date: January 13, 2020 (last updated February 21, 2025)
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.
0
Attacker Value
Unknown
CVE-2019-3465
Disclosure Date: November 07, 2019 (last updated November 08, 2023)
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
0
Attacker Value
Unknown
CVE-2011-4625
Disclosure Date: November 06, 2019 (last updated November 27, 2024)
simplesamlphp before 1.6.3 (squeeze) and before 1.8.2 (sid) incorrectly handles XML encryption which could allow remote attackers to decrypt or forge messages.
0
Attacker Value
Unknown
CVE-2019-13347
Disclosure Date: October 10, 2019 (last updated November 27, 2024)
An issue was discovered in the SAML Single Sign On (SSO) plugin for several Atlassian products affecting versions 3.1.0 through 3.2.2 for Jira and Confluence, versions 2.4.0 through 3.0.3 for Bitbucket, and versions 2.4.0 through 2.5.2 for Bamboo. It allows locally disabled users to reactivate their accounts just by browsing the affected Jira/Confluence/Bitbucket/Bamboo instance, even when the applicable configuration option of the plugin has been disabled ("Reactivate inactive users"). Exploiting this vulnerability requires an attacker to be authorized by the identity provider and requires that the plugin's configuration option "User Update Method" have the "Update from SAML Attributes" value.
0
Attacker Value
Unknown
CVE-2016-10928
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
The onelogin-saml-sso plugin before 2.2.0 for WordPress has a hardcoded @@@nopass@@@ password for just-in-time provisioned users.
0
Attacker Value
Unknown
CVE-2018-20857
Disclosure Date: July 26, 2019 (last updated November 27, 2024)
Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name.
0
Attacker Value
Unknown
CVE-2019-12346
Disclosure Date: June 24, 2019 (last updated November 27, 2024)
In the miniOrange SAML SP Single Sign On plugin before 4.8.73 for WordPress, the SAML Login Endpoint is vulnerable to XSS via a specially crafted SAMLResponse XML post.
0
Attacker Value
Unknown
Multiple SAML libraries may allow authentication bypass via incorrect XML cano…
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
0
Attacker Value
Unknown
Multiple SAML libraries may allow authentication bypass via incorrect XML cano…
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
0