The default configuration of the auth/saml plugin in Mahara before 1.4.2 sets the "Match username attribute to Remote username" option to false, which allows remote SAML IdP servers to spoof users of other SAML IdP servers by using the same internal username.
References
Link | Resource |
---|---|
http://gitorious.org/mahara/mahara/commit/f07be6020e70fa8f53cd77fdcd63e7fd7ff8aaea | Patch Issue Tracking |
http://www.debian.org/security/2012/dsa-2467 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/05/11/9 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/05/12/4 | Mailing List Third Party Advisory |
https://bugs.launchpad.net/mahara/+bug/932909 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2012-07-12 20:55
Updated : 2024-02-28 12:00
NVD link : CVE-2012-2351
Mitre link : CVE-2012-2351
CVE.ORG link : CVE-2012-2351
JSON object : View
Products Affected
mahara
- mahara
debian
- debian_linux