pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
References
Link | Resource |
---|---|
https://github.com/rohe/pysaml2/issues/451 | Patch Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201801-11 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html | Mailing List Third Party Advisory |
Information
Published : 2018-01-02 15:29
Updated : 2021-03-04 13:16
NVD link : CVE-2017-1000433
Mitre link : CVE-2017-1000433
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
debian
- debian_linux
pysaml2_project
- pysaml2