CVE-2020-5390
Summary
| CVE | CVE-2020-5390 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-01-13 19:15:00 UTC |
| Updated | 2023-02-01 17:08:00 UTC |
| Description | PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Fix XML Signature Wrapping (XSW) vulnerabilities · IdentityPython/pysaml2@5e9d5ac · GitHub |
CONFIRM |
github.com |
Patch, Third Party Advisory |
| USN-4245-1: PySAML2 vulnerability | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
|
| Debian -- Security Information -- DSA-4630-1 python-pysaml2 |
DEBIAN |
www.debian.org |
|
| Release Version 5.0.0 · IdentityPython/pysaml2 · GitHub |
CONFIRM |
github.com |
Release Notes, Third Party Advisory |
| pysaml2 · PyPI |
MISC |
pypi.org |
Product, Third Party Advisory |
| Release version 5.0.0 · IdentityPython/pysaml2@f27c7e7 · GitHub |
CONFIRM |
github.com |
Patch, Third Party Advisory |
| [SECURITY] [DLA 2119-1] python-pysaml2 security update |
MLIST |
lists.debian.org |
|
| Releases · IdentityPython/pysaml2 · GitHub |
CONFIRM |
github.com |
Release Notes, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 981492 Python (pip) Security Update for pysaml2 (GHSA-qf7v-8hj3-4xw7)