cvelist/2015/5xxx/CVE-2015-5372.json
2019-03-18 03:06:35 +00:00

82 lines
3.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5372",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SAML 2.0 implementation in AdNovum nevisAuth 4.13.0.0 before 4.18.3.1, when using SAML POST-Binding, does not match all attributes of the X.509 certificate embedded in the assertion against the certificate from the identity provider (IdP), which allows remote attackers to inject arbitrary SAML assertions via a crafted certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/133628/nevisAuth-Authentication-Bypass.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133628/nevisAuth-Authentication-Bypass.html"
},
{
"name": "20150923 CVE-2015-5372 SAML SP Authentication Bypass in nevisAuth",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Sep/87"
},
{
"name": "http://www.csnc.ch/misc/files/advisories/CVE-2015-5372_AdNovum_nevisAuth_Authentication_Bypass.txt",
"refsource": "MISC",
"url": "http://www.csnc.ch/misc/files/advisories/CVE-2015-5372_AdNovum_nevisAuth_Authentication_Bypass.txt"
},
{
"name": "20150921 CVE-2015-5372 SAML SP Authentication Bypass in nevisAuth",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/536508/100/0/threaded"
},
{
"name": "http://blog.csnc.ch/2015/09/saml-sp-authentication-bypass-vulnerability-in-nevisauth",
"refsource": "MISC",
"url": "http://blog.csnc.ch/2015/09/saml-sp-authentication-bypass-vulnerability-in-nevisauth"
}
]
}
}