CVE-2020-5390 — Improper Verification of Cryptographic Signature in Project Pysaml2
Severity
7.5HIGHNVD
EPSS
0.8%
top 26.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateJun 19
Description
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Also affects: Debian Linux 10.0, 8.0, 9.0, Ubuntu Linux 16.04, 18.04, 19.04, 19.10
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3📄Research Papers
1arXiv▶
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany↗2021-06-19
💬Community
3Bugzilla▶
CVE-2020-5390 python-pysaml2: does not check that the signature in a SAML document is enveloped [openstack-rdo]↗2020-01-24
Bugzilla▶
CVE-2020-5390 python-pysaml2: does not check that the signature in a SAML document is enveloped↗2020-01-24
Bugzilla▶
CVE-2020-5390 python-pysaml2: does not check that the signature in a SAML document is enveloped [fedora-all]↗2020-01-24