The SAML 2.0 implementation in AdNovum nevisAuth 4.13.0.0 before 4.18.3.1, when using SAML POST-Binding, does not match all attributes of the X.509 certificate embedded in the assertion against the certificate from the identity provider (IdP), which allows remote attackers to inject arbitrary SAML assertions via a crafted certificate.
References
Configurations
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.csnc.ch/2015/09/saml-sp-authentication-bypass-vulnerability-in-nevisauth - | |
References | () http://packetstormsecurity.com/files/133628/nevisAuth-Authentication-Bypass.html - | |
References | () http://seclists.org/fulldisclosure/2015/Sep/87 - | |
References | () http://www.csnc.ch/misc/files/advisories/CVE-2015-5372_AdNovum_nevisAuth_Authentication_Bypass.txt - | |
References | () http://www.securityfocus.com/archive/1/536508/100/0/threaded - |
Information
Published : 2015-09-28 16:59
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5372
Mitre link : CVE-2015-5372
CVE.ORG link : CVE-2015-5372
JSON object : View
Products Affected
adnovum
- nevisauth
CWE
CWE-287
Improper Authentication