An issue was discovered in Aviatrix Controller through 5.1. An attacker with any signed SAML assertion from the Identity Provider can establish a connection (even if that SAML assertion has expired or is from a user who is not authorized to access Aviatrix), aka XML Signature Wrapping.
References
Link | Resource |
---|---|
https://docs.aviatrix.com/HowTos/security_bulletin_article.html#xml-signature-wrapping-in-saml | Exploit Vendor Advisory |
https://docs.aviatrix.com/HowTos/security_bulletin_article.html#xml-signature-wrapping-in-saml | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.aviatrix.com/HowTos/security_bulletin_article.html#xml-signature-wrapping-in-saml - Exploit, Vendor Advisory |
Information
Published : 2020-05-22 21:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13415
Mitre link : CVE-2020-13415
CVE.ORG link : CVE-2020-13415
JSON object : View
Products Affected
aviatrix
- controller
CWE
CWE-347
Improper Verification of Cryptographic Signature