{"api_version":"1","generated_at":"2026-04-12T02:42:34+00:00","cve":"CVE-2020-5390","urls":{"html":"https://cve.report/CVE-2020-5390","api":"https://cve.report/api/cve/CVE-2020-5390.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-5390","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-5390"},"summary":{"title":"CVE-2020-5390","description":"PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-01-13 19:15:00","updated_at":"2023-02-01 17:08:00"},"problem_types":["CWE-347"],"metrics":[],"references":[{"url":"https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25","name":"https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"Fix XML Signature Wrapping (XSW) vulnerabilities · IdentityPython/pysaml2@5e9d5ac · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/4245-1/","name":"USN-4245-1","refsource":"UBUNTU","tags":[],"title":"USN-4245-1: PySAML2 vulnerability | Ubuntu security notices | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2020/dsa-4630","name":"DSA-4630","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-4630-1 python-pysaml2","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0","name":"https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0","refsource":"CONFIRM","tags":["Release Notes","Third Party Advisory"],"title":"Release Version 5.0.0 · IdentityPython/pysaml2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://pypi.org/project/pysaml2/5.0.0/","name":"https://pypi.org/project/pysaml2/5.0.0/","refsource":"MISC","tags":["Product","Third Party Advisory"],"title":"pysaml2 · PyPI","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e","name":"https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"Release version 5.0.0 · IdentityPython/pysaml2@f27c7e7 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html","name":"[debian-lts-announce] 20200226 [SECURITY] [DLA 2119-1] python-pysaml2 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2119-1] python-pysaml2 security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/IdentityPython/pysaml2/releases","name":"https://github.com/IdentityPython/pysaml2/releases","refsource":"CONFIRM","tags":["Release Notes","Third Party Advisory"],"title":"Releases · IdentityPython/pysaml2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-5390","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5390","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"16.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"18.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"19.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"19.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pysaml2_project","cpe5":"pysaml2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5390","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pysaml2_project","cpe5":"pysaml2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-5390","qid":"981492","title":"Python (pip) Security Update for pysaml2 (GHSA-qf7v-8hj3-4xw7)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-5390","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"CONFIRM","name":"https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25","url":"https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25"},{"refsource":"CONFIRM","name":"https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e","url":"https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e"},{"refsource":"CONFIRM","name":"https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0","url":"https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0"},{"refsource":"CONFIRM","name":"https://github.com/IdentityPython/pysaml2/releases","url":"https://github.com/IdentityPython/pysaml2/releases"},{"refsource":"MISC","name":"https://pypi.org/project/pysaml2/5.0.0/","url":"https://pypi.org/project/pysaml2/5.0.0/"},{"refsource":"UBUNTU","name":"USN-4245-1","url":"https://usn.ubuntu.com/4245-1/"},{"refsource":"DEBIAN","name":"DSA-4630","url":"https://www.debian.org/security/2020/dsa-4630"},{"refsource":"MLIST","name":"[debian-lts-announce] 20200226 [SECURITY] [DLA 2119-1] python-pysaml2 security update","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html"}]}},"nvd":{"publishedDate":"2020-01-13 19:15:00","lastModifiedDate":"2023-02-01 17:08:00","problem_types":["CWE-347"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pysaml2_project:pysaml2:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"5390","Ordinal":"165610","Title":"CVE-2020-5390","CVE":"CVE-2020-5390","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"5390","Ordinal":"1","NoteData":"PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"5390","Ordinal":"2","NoteData":"2020-01-13","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"5390","Ordinal":"3","NoteData":"2020-02-26","Type":"Other","Title":"Modified"}]}}}