mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
96 lines
3.1 KiB
JSON
96 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2015-5372",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-09-28T16:59:05.617",
|
|
"lastModified": "2018-10-09T19:57:32.127",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The SAML 2.0 implementation in AdNovum nevisAuth 4.13.0.0 before 4.18.3.1, when using SAML POST-Binding, does not match all attributes of the X.509 certificate embedded in the assertion against the certificate from the identity provider (IdP), which allows remote attackers to inject arbitrary SAML assertions via a crafted certificate."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad en la implementaci\u00f3n SAML 2.0 en AdNovum nevisAuth 4.13.0.0 en versiones anteriores a 4.18.3.1, cuando se usa SAML POST-Binding, no encuentra todos los atributos del certificado embebido en la aserci\u00f3n contra el certificado del proveedor de identidad (IdP), lo que permite a atacantes remotos inyectar aserciones SAML arbitrartias a trav\u00e9s de un certificado manipulado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-287"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adnovum:nevisauth:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.18.3.0",
|
|
"matchCriteriaId": "4C42D45F-BB76-4B41-A867-B0C2E777A84B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://blog.csnc.ch/2015/09/saml-sp-authentication-bypass-vulnerability-in-nevisauth",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/133628/nevisAuth-Authentication-Bypass.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2015/Sep/87",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.csnc.ch/misc/files/advisories/CVE-2015-5372_AdNovum_nevisAuth_Authentication_Bypass.txt",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/536508/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |