IBM Tivoli Federated Identity Manager (TFIM) and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.1.1, 6.2.0, 6.2.1, and 6.2.2 allow remote malicious users to establish sessions via a crafted message that leverages (1) a signature-validation bypass for SAML messages containing unsigned elements, (2) incorrect validation of XML messages, or (3) a certificate-chain validation bypass for an XML signature element that contains the signing certificate.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ibm tivoli federated identity manager 6.2.1 |
||
ibm tivoli federated identity manager 6.2.2 |
||
ibm tivoli federated identity manager 6.1.1 |
||
ibm tivoli federated identity manager 6.2.0 |
||
ibm tivoli federated identity manager business gateway 6.2.0 |
||
ibm tivoli federated identity manager business gateway 6.2.1 |
||
ibm tivoli federated identity manager business gateway 6.1.1 |
||
ibm tivoli federated identity manager business gateway 6.2.2 |