Directory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field ("kid") of the IdP's HTTP response message ("WLS-Response") can be manipulated by an attacker. The "kid" field is not signed like the rest of the message, and manipulation is therefore trivial. The "kid" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.
References
Link | Resource |
---|---|
https://doi.org/10.1007/978-3-030-03251-7_1 | Permissions Required Third Party Advisory |
https://github.com/grymer/CVE | Third Party Advisory |
https://doi.org/10.1007/978-3-030-03251-7_1 | Permissions Required Third Party Advisory |
https://github.com/grymer/CVE | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://doi.org/10.1007/978-3-030-03251-7_1 - Permissions Required, Third Party Advisory | |
References | () https://github.com/grymer/CVE - Third Party Advisory |
Information
Published : 2019-05-13 16:29
Updated : 2024-11-21 02:40
NVD link : CVE-2015-9287
Mitre link : CVE-2015-9287
CVE.ORG link : CVE-2015-9287
JSON object : View
Products Affected
cam
- the_university_of_cambridge_web_authentication_system_apache_authentication_agent
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')