The default configuration of the auth/saml plugin in Mahara before 1.4.2 sets the "Match username attribute to Remote username" option to false, which allows remote SAML IdP servers to spoof users of other SAML IdP servers by using the same internal username.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/mahara/+bug/932909 | Issue Tracking |
http://gitorious.org/mahara/mahara/commit/f07be6020e70fa8f53cd77fdcd63e7fd7ff8aaea | Patch Issue Tracking |
http://www.openwall.com/lists/oss-security/2012/05/12/4 | Mailing List Third Party Advisory |
http://www.debian.org/security/2012/dsa-2467 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/05/11/9 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2012-07-12 13:55
Updated : 2016-12-07 09:43
NVD link : CVE-2012-2351
Mitre link : CVE-2012-2351
JSON object : View
Products Affected
debian
- debian_linux
mahara
- mahara