Show filters
109 Total Results
Displaying 71-80 of 109
Sort by:
Attacker Value
Unknown
Multiple SAML libraries may allow authentication bypass via incorrect XML cano…
Disclosure Date: April 17, 2019 (last updated September 21, 2024)
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
0
Attacker Value
Unknown
Multiple SAML libraries may allow authentication bypass via incorrect XML cano…
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
Clever saml2-js 2.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
0
Attacker Value
Unknown
CVE-2014-3603
Disclosure Date: April 04, 2019 (last updated November 27, 2024)
The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
0
Attacker Value
Unknown
Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and …
Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
0
Attacker Value
Unknown
CVE-2018-1000602
Disclosure Date: June 26, 2018 (last updated November 26, 2024)
A session fixation vulnerability exists in Jenkins SAML Plugin 1.0.6 and earlier in SamlSecurityRealm.java that allows unauthorized attackers to impersonate another users if they can control the pre-authentication session.
0
Attacker Value
Unknown
CVE-2018-1000165
Disclosure Date: April 18, 2018 (last updated November 26, 2024)
LightSAML version prior to 1.3.5 contains a Incorrect Access Control vulnerability in signature validation in readers in src/LightSaml/Model/XmlDSig/ that can result in impersonation of any user from Identity Provider. This vulnerability appears to have been fixed in 1.3.5 and later.
0
Attacker Value
Unknown
CVE-2018-7711
Disclosure Date: March 05, 2018 (last updated November 26, 2024)
HTTPRedirect.php in the saml2 library in SimpleSAMLphp before 1.15.4 has an incorrect check of return values in the signature validation utilities, allowing an attacker to get invalid signatures accepted as valid by forcing an error during validation. This occurs because of a dependency on PHP functionality that interprets a -1 error code as a true boolean value.
0
Attacker Value
Unknown
CVE-2018-7644
Disclosure Date: March 05, 2018 (last updated November 26, 2024)
The XmlSecLibs library as used in the saml2 library in SimpleSAMLphp before 1.15.3 incorrectly verifies signatures on SAML assertions, allowing a remote attacker to construct a crafted SAML assertion on behalf of an Identity Provider that would pass as cryptographically valid, thereby allowing them to impersonate a user from that Identity Provider, aka a key confusion issue.
0
Attacker Value
Unknown
CVE-2017-18122
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
A signature-validation bypass issue was discovered in SimpleSAMLphp through 1.14.16. A SimpleSAMLphp Service Provider using SAML 1.1 will regard as valid any unsigned SAML response containing more than one signed assertion, provided that the signature of at least one of the assertions is valid. Attributes contained in all the assertions received will be merged and the entityID of the first assertion received will be used, allowing an attacker to impersonate any user of any IdP given an assertion signed by the targeted IdP.
0
Attacker Value
Unknown
CVE-2017-18121
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
The consentAdmin module in SimpleSAMLphp through 1.14.15 is vulnerable to a Cross-Site Scripting attack, allowing an attacker to craft links that could execute arbitrary JavaScript code on the victim's web browser.
0