Shibboleth OpenSAML library 2.4.x before 2.4.3 and 2.5.x before 2.5.1, and IdP before 2.3.2, allows remote attackers to forge messages and bypass authentication via an "XML Signature wrapping attack."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/50994 - | |
References | () http://shibboleth.internet2.edu/secadv/secadv_20110725.txt - Vendor Advisory | |
References | () http://www.debian.org/security/2011/dsa-2284 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - | |
References | () http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - |
Information
Published : 2011-09-02 23:55
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1411
Mitre link : CVE-2011-1411
CVE.ORG link : CVE-2011-1411
JSON object : View
Products Affected
shibboleth
- opensaml
- shibboleth-identity-provider
CWE
CWE-287
Improper Authentication