2 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

Shibboleth XMLTooling-C before 1.6.4, as used in Shibboleth Service Provider before 2.6.1.4 on Windows and other products, mishandles digital signatures of user data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via crafted XML data. NOTE: this issue exists because of an incomplete fix for CVE-2018-0486. Shibboleth XMLTooling-C en versiones anteriores a la 1.6.4, tal y como se emplea en Shibboleth Service Provider en versiones anteriores a la 2.6.1.4 en Windows y otros productos, gestiona de manera incorrecta las firmas digitales de datos de usuario. Esto permite que atacantes remotos obtengan información sensible o lleven a cabo ataques de suplantación mediante datos XML manipulados. NOTA: este problema existe debido a una solución incompleta para CVE-2018-0486. • http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt http://www.securityfocus.com/bid/103172 http://www.securitytracker.com/id/1040435 https://lists.debian.org/debian-lts-announce/2018/02/msg00031.html https://shibboleth.net/community/advisories/secadv_20180227.txt https://www.debian.org/security/2018/dsa-4126 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

Shibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD. Shibboleth XMLTooling-C en versiones anteriores a la 1.6.3, tal y como se emplea en Shibboleth Service Provider en versiones anteriores a la 2.6.0 en Windows y otros productos, gestiona de manera incorrecta las firmas digitales de datos de atributos de usuario. Esto permite que atacantes remotos obtengan información sensible o lleven a cabo ataques de suplantación mediante una DTD manipulado. RedTeam Pentesting discovered that the shibd service of Shibboleth 2 does not extract SAML attribute values in a robust manner. By inserting XML entities into a SAML response, attackers may truncate attribute values without breaking the document's signature. • http://www.securitytracker.com/id/1040177 https://lists.debian.org/debian-lts-announce/2018/01/msg00016.html https://lists.debian.org/debian-security-announce/2018/msg00007.html https://shibboleth.net/community/advisories/secadv_20180112.txt https://www.debian.org/security/2018/dsa-4085 • CWE-347: Improper Verification of Cryptographic Signature •