Java Open Single Sign-On Project Home (JOSSO) allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack."
References
Configurations
History
21 Nov 2024, 01:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf - | |
References | () http://www.securityfocus.com/bid/55892 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=865169 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79241 - |
Information
Published : 2012-10-09 23:55
Updated : 2024-11-21 01:44
NVD link : CVE-2012-5352
Mitre link : CVE-2012-5352
CVE.ORG link : CVE-2012-5352
JSON object : View
Products Affected
josso
- java_open_single_sign-on_project_home
CWE
CWE-287
Improper Authentication