CVE-2017-1000433

pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
References
Link Resource
https://github.com/rohe/pysaml2/issues/451 Patch Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201801-11 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:pysaml2_project:pysaml2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2018-01-02 15:29

Updated : 2021-03-04 13:16


NVD link : CVE-2017-1000433

Mitre link : CVE-2017-1000433


JSON object : View

CWE
CWE-287

Improper Authentication

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

pysaml2_project

  • pysaml2