6.5
CVSSv3

CVE-2018-0486

Published: 13/01/2018 Updated: 15/02/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 6.5 | Impact Score: 2.5 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Shibboleth XMLTooling-C prior to 1.6.3, as used in Shibboleth Service Provider prior to 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote malicious users to obtain sensitive information or conduct impersonation attacks via a crafted DTD.

Vulnerable Product Search on Vulmon Subscribe to Product

shibboleth xmltooling-c

debian debian linux 8.0

debian debian linux 7.0

debian debian linux 9.0

Vendor Advisories

Philip Huppert discovered the Shibboleth service provider is vulnerable to impersonation attacks and information disclosure due to mishandling of DTDs in the XMLTooling XML parsing library For additional details please refer to the upstream advisory at shibbolethnet/community/advisories/secadv_20180112txt For the oldstable distribution ( ...
Shibboleth XMLTooling-C before 163, as used in Shibboleth Service Provider before 260 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD ...

Exploits

RedTeam Pentesting discovered that the shibd service of Shibboleth 2 does not extract SAML attribute values in a robust manner By inserting XML entities into a SAML response, attackers may truncate attribute values without breaking the document's signature This might lead to a complete bypass of authorisation mechanisms Versions prior to 261 a ...