cvelist/2012/2xxx/CVE-2012-2351.json
2019-03-18 06:01:02 +00:00

82 lines
2.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2351",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The default configuration of the auth/saml plugin in Mahara before 1.4.2 sets the \"Match username attribute to Remote username\" option to false, which allows remote SAML IdP servers to spoof users of other SAML IdP servers by using the same internal username."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.launchpad.net/mahara/+bug/932909",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/mahara/+bug/932909"
},
{
"name": "http://gitorious.org/mahara/mahara/commit/f07be6020e70fa8f53cd77fdcd63e7fd7ff8aaea",
"refsource": "CONFIRM",
"url": "http://gitorious.org/mahara/mahara/commit/f07be6020e70fa8f53cd77fdcd63e7fd7ff8aaea"
},
{
"name": "DSA-2467",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2467"
},
{
"name": "[oss-security] 20120511 CVE request: mahara",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/11/9"
},
{
"name": "[oss-security] 20120512 Re: CVE request: mahara",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/12/4"
}
]
}
}