CVE-2020-5390

high

Description

PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.

References

https://www.debian.org/security/2020/dsa-4630

https://usn.ubuntu.com/4245-1/

https://pypi.org/project/pysaml2/5.0.0/

https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html

https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0

https://github.com/IdentityPython/pysaml2/releases

https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e

https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25

Details

Source: Mitre, NVD

Published: 2020-01-13

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Severity: High