CVE-2021-3196
Summary
| CVE | CVE-2021-3196 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-06-09 15:15:00 UTC |
| Updated | 2021-06-24 16:34:00 UTC |
| Description | An issue was discovered in Hitachi ID Bravura Security Fabric 11.0.0 through 11.1.3, 12.0.0 through 12.0.2, and 12.1.0. When using federated identity management (authenticating via SAML through a third-party identity provider), an attacker can inject additional data into a signed SAML response being transmitted to the service provider (ID Bravura Security Fabric). The application successfully validates the signed values but uses the unsigned malicious values. An attacker with lower-privilege access to the application can inject the username of a high-privilege user to impersonate that user. |
Risk And Classification
Problem Types: CWE-347
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Hitachi | Id Bravura Security Fabric | 12.1.0 | All | All | All |
| Application | Hitachi | Id Bravura Security Fabric | All | All | All | All |
| Application | Hitachi | Id Bravura Security Fabric | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Information: Hitachi Incident Response Team : Hitachi | MISC | www.hitachi.com | |
| hitachi-sec-2021-601XML Signature Wrapping Attack (XSW) issue in Hitachi ID Bravura Security Fabric : Hitachi Incident Response Team : Hitachi | CONFIRM | www.hitachi.com | |
| Vulnerability Alert | CVE-2021-3196 Attackers Can Impersonate Another User | CONFIRM | www.hitachi-id.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.