CVE-2017-1000433
Summary
| CVE | CVE-2017-1000433 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-01-02 23:29:00 UTC |
| Updated | 2021-03-04 21:16:00 UTC |
| Description | pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| PySAML2: Security bypass (GLSA 201801-11) — Gentoo security |
GENTOO |
security.gentoo.org |
Issue Tracking, Third Party Advisory |
| [SECURITY] [DLA 2577-1] python-pysaml2 security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| [SECURITY] [DLA 1410-1] python-pysaml2 security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Running python with optimizations makes UsernamePasswordMako accept any password for any user · Issue #451 · rohe/pysaml2 · GitHub |
CONFIRM |
github.com |
Patch, Third Party Advisory, VDB Entry |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 710314 Gentoo Linux PySAML2 Security bypass Vulnerability (GLSA 201801-11)
- 981178 Python (pip) Security Update for pysaml2 (GHSA-924m-4pmx-c67h)