mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
175 lines
5.9 KiB
JSON
175 lines
5.9 KiB
JSON
{
|
|
"id": "CVE-2011-1411",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-09-02T23:55:04.240",
|
|
"lastModified": "2013-10-11T03:34:32.480",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Shibboleth OpenSAML library 2.4.x before 2.4.3 and 2.5.x before 2.5.1, and IdP before 2.3.2, allows remote attackers to forge messages and bypass authentication via an \"XML Signature wrapping attack.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La librer\u00eda Shibboleth OpenSAML v2.4.x antes de v2.4.3 y v2.5.x antes de v2.5.1, e IdP antes de v2.3.2, permite a atacantes remotos falsificar mensajes y eludir la autenticaci\u00f3n a trav\u00e9s de un ataque \"XML Signature wrapping\""
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-287"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:opensaml:2.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "326C4DAA-C2FE-431E-82AE-5260484EBDC4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:opensaml:2.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68F5A4FF-96ED-41CD-A83F-3810B9036037"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:opensaml:2.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71772B98-345F-42E0-BBAC-309E24D887B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:opensaml:2.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7CD6A0B-B78E-4D3C-81E4-27B8E4430F78"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.3.1",
|
|
"matchCriteriaId": "6A943122-D2CD-4E2A-A0D5-A3C71B5E62EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7AAD703-4FB6-456A-B90E-370F3678FD02"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8969B3F6-03A3-471A-A023-A261D36995C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4490D05A-8D8E-4445-B404-6B951C50D5F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9DEB9670-E47E-4181-8607-7F2E3C59306B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9288EBA7-5975-4CF6-974B-45A12F2B81DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C5D4672-D1D7-41D3-8AAA-3EA180D5DDCB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "45AE00EF-707A-42FE-8673-0F1524C0B368"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A7BEDBC-8026-459D-8A46-2F23311B23A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "857E10D3-3701-45CB-AAD7-31D8990A3DE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EC7D93A-FB15-4099-BF63-221704CEBA9B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://shibboleth.internet2.edu/secadv/secadv_20110725.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2011/dsa-2284",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |