René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

128 lines
4.3 KiB
JSON

{
"id": "CVE-2011-1386",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-01-04T03:55:09.067",
"lastModified": "2017-08-17T01:34:06.807",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "IBM Tivoli Federated Identity Manager (TFIM) and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.1.1, 6.2.0, and 6.2.1 do not properly handle signature validations based on SAML 1.0, 1.1, and 2.0, which allows remote attackers to bypass intended authentication or authorization requirements via a non-conforming SAML signature."
},
{
"lang": "es",
"value": "IBM Tivoli Federated Identity Manager (TFIM) y Tivoli Federated Identity Manager Business Gateway (TFIMBG) v6.1.1, v6.2.0, y v6.2.1, no manejan adecuadamente las validaciones de firmas basadas en SAML v1.0, v1.1, y v2.0, lo que permite a atacantes remotos evitar las restricciones de acceso o requisitos de autorizaci\u00f3n a trav\u00e9s de una firma SAML no conforme."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7713A26A-87C9-4BF1-A6D1-89DFD7BF5574"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E508843E-DEA8-433D-AFD5-2730D2745E0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F674F64E-F51F-4F5E-AFCD-952958E66FE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_federated_identity_manager_business_gateway:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58E139B7-C2A2-4505-A384-8C3F08D211E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_federated_identity_manager_business_gateway:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1807D56B-4569-47FB-8562-0DA753DCFD89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_federated_identity_manager_business_gateway:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C58DE666-C96D-48DA-B9C2-D99055976B55"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV10793",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV10801",
"source": "cve@mitre.org"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV10813",
"source": "cve@mitre.org"
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=swg21575309",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71686",
"source": "cve@mitre.org"
}
]
}