5.8
CVSSv2

CVE-2011-1411

Published: 02/09/2011 Updated: 11/10/2013
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

Shibboleth OpenSAML library 2.4.x prior to 2.4.3 and 2.5.x prior to 2.5.1, and IdP prior to 2.3.2, allows remote malicious users to forge messages and bypass authentication via an "XML Signature wrapping attack."

Vulnerable Product Search on Vulmon Subscribe to Product

shibboleth opensaml 2.4.0

shibboleth opensaml 2.4.1

shibboleth opensaml 2.4.2

shibboleth opensaml 2.5.0

shibboleth shibboleth-identity-provider 2.2.0

shibboleth shibboleth-identity-provider 2.1.5

shibboleth shibboleth-identity-provider 2.1.4

shibboleth shibboleth-identity-provider 2.1.3

shibboleth shibboleth-identity-provider 2.3.0

shibboleth shibboleth-identity-provider 2.2.1

shibboleth shibboleth-identity-provider 2.1.0

shibboleth shibboleth-identity-provider 2.0.0

shibboleth shibboleth-identity-provider

shibboleth shibboleth-identity-provider 2.1.2

shibboleth shibboleth-identity-provider 2.1.1

Vendor Advisories

Juraj Somorovsky, Andreas Mayer, Meiko Jensen, Florian Kohlar, Marco Kampmann and Joerg Schwenk discovered that Shibboleth, a federated web single sign-on system is vulnerable to XML signature wrapping attacks More details can be found in the Shibboleth advisory For the oldstable distribution (lenny), this problem has been fixed in version 20-2+ ...